A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method
Author:
Xie LixiaORCID, Ni HuiyuORCID, Xu GuangquanORCID, Zhang Jiyong
Publisher
Springer Singapore
Reference11 articles.
1. Moldagulova, A., Uskenbayeva, R.K., Satybaldiyeva, R.Z., Kamennova, M.S., Kalpeeva, Z.B., Bektemyssova, G.U.: On identification of hybrid business processes for effective implementation in the form of cloud services. In: 2019 19th International Conference on Control, Automation and Systems (ICCAS), pp. 51–54, IEEE, Jeju (2019) 2. Sherzod, G., Abdukhalil, G., Viktoriya, V.: Formalization of the business process security. In: 2019 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1–3. IEEE, Tashkent (2019) 3. Ming, Q., Songtao, L.: Overview of system wide information management and security analysis. In: 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), pp. 191–194, IEEE, Bangkok (2017) 4. Stergiopoulos, G., Dedousis, P., Gritzalis, D.: Automatic network restructuring and risk mitigation through business process asset dependency analysis. Comput. Secur. 96, 101869 (2020) 5. Matulevičius, R., Norta, A., Samarütel, S.: Security requirements elicitation from airline turnaround processes. Bus. Inf. Syst. Eng. 60, 3–20 (2018)
|
|