Author:
Smith Elme,Eloff Jan H. P.
Reference8 articles.
1. LABUSCHAGNE, L. 1992. “Inligtingsekerheid, met spesifieke verwysing na risikoontleding.” Rand Afrikaans University. Johannesburg, South Africa (dissertation (MCom)-RAU).
2. PFLEEGER, C.P. 1997. Security in computing. United States of America: Prentice-Hall International Inc. 574 p.
3. BADENHORST, K.P & ELOFF, J.H.P. 1989. Framework of a methodology for the life cycle of computer security in an institution. Computers & Security. 8: 433–442.
4. ELOFF, J.H.P. & SMITH E. 2000. Cognitive fuzzy modeling for enhanced risk assessment in a health care institution. IEEE Intelligent systems & their applications. 15(2): 69–75.
5. COX, E.D. 1994. The fuzzy systems handbook: A practitioner’s guide to building, using and maintaining fuzzy systems. Boston: Academic Press. 515 p.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献