Number of the records: 1  

Application of fuzzy logic in the process of information security risk assessment

  1. Title Application of fuzzy logic in the process of information security risk assessment
    TranslationAplikácia fuzzy logiky v procese hodnotenia rizika informačnej bezpečnosti
    Author infoMojmír Kokles, Jana Filanová, František Korček
    Author Kokles Mojmír EUBFPMKIM - Katedra informačného manažmentu FPM
    Co-authors Filanová Jana EUBFPMKIM - Katedra informačného manažmentu FPM
    Korček František EUBFPMKIM - Katedra informačného manažmentu FPM
    Source document Innovation management and education excellence vision 2020: from regional development sustainability to global economic growth : proceedings of the 27th international business information management association conference : may 4-5, 2016, Milan, Italy. S. 1078-1088 CD-ROM. - Norristown : International Business Information Management Association (IBIMA), 2016 / Soliman Khalid S. ; Innovation management and education excellence vision 2020: from regional development sustainability to global economic growth International business information management association conference. ISBN 978-0-9860419-6-9
    NoteVEGA 1/0336/14. - Registrovaný: Web of Science. - Registrovaný: Scopus
    Document kindschedule of articles from year books
    LanguageEnglish
    Country of EditionUnited States of America
    systematics 007 - Kybernetika. Systémová veda
    Keywords riziko * logika * bezpečnosť informačná
    AnnotationHodnotenie rizika informačnej bezpečnosti na základe štandardu ISO/IEC 27005 a nariadenia č. 316/2014 o kybernetickej ochrane v ČR. Model konštrukcie aplikácie fuzzy logiky v procese hodnotenia rizika informačnej bezpečnosti.
    Public work categoryReports at international scientific conferences
    Registered inWOS
    Registered inSCOPUS
    DatabasePUBLIKAČNÁ ČINNOSŤ
    No. of Archival CopyE16 00332-002, originál dokumentu

Number of the records: 1  

  This site uses cookies to make them easier to browse. Learn more about how we use cookies.