[1]
Yeu-Pong Lai, Po-Lun Hsia. Using the vulnerability information of computer systems to improve the network security. computer communications. Vol. 30 (2007)p.2032-(2047).
DOI: 10.1016/j.comcom.2007.03.007
Google Scholar
[2]
Igino Corona, Giorgio Giacinto. ect. Information fusion for computer security: State of the art and open issues. Information Fusion. Vol. 10(2009) pp.274-284.
DOI: 10.1016/j.inffus.2009.03.001
Google Scholar
[3]
Kerry-Lynn Thomson, Rossouw von Solms. Information security obedience: a definition. computer & security. Vol. 24(2005), pp.69-75.
DOI: 10.1016/j.cose.2004.10.005
Google Scholar
[4]
Ji-yu Wei, Chun-hui Wang. A novel approach-Fuzzy ANP for distribution center location. 2009International Conference on Machine Learning and Cybernetics. Vol. 1(2009) p.538.
DOI: 10.1109/icmlc.2009.5212492
Google Scholar
[5]
Chang, D.Y., Application of the extent analysis method on fuzzy AHP, European Journal of Operational Research, Vol. 95(1996) pp.649-655.
DOI: 10.1016/0377-2217(95)00300-2
Google Scholar
[6]
ZHU Qiang, YAN Zi- gang, Supplier Selection Decision- making Method Based on AHP and TOPSIS Algorithm, Communications Standardization, no. 02/03(2008) pp.197-201.
Google Scholar
[7]
Wang pu, Zuo xiufeng. Basted on ANP for supplier selection, " Science Technology and Industry, Vol. 5 (2005), pp.55-56.
Google Scholar
[8]
Wang han, Huang ming, The Research on Supplier Selection in Supply Chain Management, Journal of Dalian Railway Institute, vol. 22, (2001) pp.41-44.
Google Scholar