CN105005738A - Information security effect promotion method based on multi-attribute decision - Google Patents
Information security effect promotion method based on multi-attribute decision Download PDFInfo
- Publication number
- CN105005738A CN105005738A CN201510338436.6A CN201510338436A CN105005738A CN 105005738 A CN105005738 A CN 105005738A CN 201510338436 A CN201510338436 A CN 201510338436A CN 105005738 A CN105005738 A CN 105005738A
- Authority
- CN
- China
- Prior art keywords
- information security
- lifting scheme
- effectiveness
- information
- security effectiveness
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an information security effect promotion method based on a multi-attribute decision. The method is characterized by comprising the following steps of S1, obtaining basic requirements for an information system; S2, determining candidate information security effect promotion schemes; S3, obtaining an efficiency index EI of each information security effect promotion scheme; S4, determining key impacting factors of an information security effect promotion scheme decision; S5, computing the weight of each key impacting factor; S6, obtaining a comprehensive index GI of each information security effect promotion scheme; and S7, sorting according to a relative comprehensive index RGI, and selecting an optimal information security effect promotion scheme. The method for selecting an optimal scheme for effect promotion of information security measures based on the multi-attribute decision provides a decision support for effectively implementing system information security management, and has the advantages of good stability, high reliability, high precision, low complexity, good information security evaluation normalization and consistency, and strong information management credibility.
Description
Technical field
The present invention relates to technical field of information management, especially relate to a kind of information security effectiveness method for improving of multiple attribute decision making (MADM).
Background technology
Multiple-criteria Decision Problems extensively exists in each field.Wherein, it is multiple attribute decision making (MADM) in limited time that alternatives has, and is multiobjectives decision time alternatives continuous (infinitely individual).The investigation and application of criteria decision-making method is a lot, as: the Vague diversity method proposing a kind of new Multi-Objective Fuzzy Decision in " Multicriteria fuzzy decision-making method of Vague collection " literary composition, the method utilizes a new score function to sort to scheme, select optimal case, and provide its relevant nature, prove the defect which solving the Multicriteria fuzzy decision-making method of existing Vague collection, illustrated validity and the superiority of new method by example.A kind of new evaluation method is proposed in " the multiobjectives decision ideal interval method of Integrated Assessment of Urban Environmental Quality " literary composition, i.e. multiobjectives decision ideal interval method, city environmental quality is evaluated by the method, evaluation criterion is processed into the form of ideal interval, and determines weight by hereditary projection Pursuit Method.Project Bidding Procurement is also the decision-making problem of multi-objective of a quasi-representative, in " fuzzy Multiobjective Group Decision of Project Bidding Procurement " literary composition, the Fuzzy Multiobjective groups Decision Method based on Fuzzy Set Theory is used in calling for tenders of project decision-making, decision maker only need comply with its experience and preference, independently index evaluation is carried out to each bidder by linguistic variable, again by these linguistic variables of Fuzzy Quantification process, the calculating via decision model obtains the trap queuing of scheme.Other method somebody artificial neural networks, genetic algorithm, grey evaluation, fuzzy Bayesian decision, rough set and evidence theory, random and theory of probability, FUZZY SET APPROACH TO ENVIRONMENTAL etc.
But information security effectiveness lifting scheme or effectiveness are promoted to the multiple attribute decision making (MADM) of system of selection, research both domestic and external is few.As: have studied the correlativity that different safety practices resists a certain risk at " Evaluation of Effectiveness for Information System Safety Measurements " in literary composition, obtain safety practice Effectiveness Evaluation Model.Ambiguity multiple attributive decision making method is utilized in " application of Fuzzy Multi-Attribute Decision Making in Information Security Evaluation " literary composition, establish the quantitative model of a kind of information system security management comprehensive assessment, be intended to the impact of comprehensive various qualitative, quantitative evaluation factor, obtain the quantized value of the comprehensive evaluation to security of system, thus improve the level of scientific management of infosystem.In " Evaluation of Information System Security theory and key technology research thereof " literary composition, propose the information system security decision-making technique based on fuzzy multi-attribute group decision, and adopt the various Index Assessment safety practices of multi objective, obtain the sequence of safety practice.
When selecting optimization information security effectiveness lifting scheme, in existing major part research or selection evaluation procedure, do not utilize Fuzzy Multiple Attribute Decision Making Theory, but use the unique method that manual operation or subjective judgement are selected as optimal case simply, the selection mechanism of information security effectiveness lifting scheme is made to have suitable subjective judgement color, and select evaluation procedure comparatively complicated loaded down with trivial details, its most of system of selection does not have objectivity, thus causing information security effectiveness lifting scheme and non-optimal, its Selection effect is not good.
Summary of the invention
Technical matters to be solved by this invention is for above-mentioned deficiency of the prior art, a kind of information security effectiveness method for improving of multiple attribute decision making (MADM) is provided, the information security measures effectiveness lifting optimal case system of selection that the present invention is based on multiple attribute decision making (MADM) is that effective implementation system information security management provides decision support, the heavy dependence to the subjective factor of personnel in information security measures effect assessment process can be alleviated, subjective error disturbance is investigated to the influence degree of net result by sensitivity analysis, namely when the internal and external factor of scheme changes, desired value is in what range, the order of having discharged is constant, thus the stability of analysis decision result and reliability, decrease the subjectivity of input data.The standardization of the measure effect assessment process that can ensure information security and the consistance of information security measures effect assessment result and trackability, reduce the complexity that information security measures effectiveness promotes optimal case selection, improve the objective confidence level that information security measures effectiveness promotes optimal case selection, its effect is all good, for the information security management activity in real network environment provides guidance.
For solving the problems of the technologies described above, the technical solution used in the present invention is: a kind of information security effectiveness method for improving of multiple attribute decision making (MADM), is characterized in that, comprise the following steps:
The basic demand of S1, obtaining information system;
S2, determine alternative information security effect lifting scheme;
The efficiency index EI of S3, obtaining information safety effectiveness lifting scheme;
The main affecting factors of S4, the decision-making of comformed information safety effectiveness lifting scheme;
The weight of S5, calculating main affecting factors;
The aggregative index GI of S6, obtaining information safety effectiveness lifting scheme;
S7, to sort according to relative aggregative index RGI, select optimization information security effect lifting scheme.
Further, described step S1 is specially: described infosystem basic demand is the basic demand meeting safe class requirement, and the unacceptable material risk of energy countermeasure system, cost is at acceptable scope and other related requests.
Further, described step S2 is specially: determine alternative information security effectiveness lifting scheme set P:{Pj|j=1,2 ..., s}, wherein, Pj is jth kind information security effectiveness lifting scheme, and s is the quantity of the safe effectiveness lifting scheme of alternate information.
Further, described step S3 is specially: described efficiency index EI account form is
wherein, RLi is the risk class of risk ri, eji be information security effectiveness lifting scheme Pi to the validity of anti-risk ri, provide according to theoretical analysis, historical data, knowledge experience and actual conditions by sensitivity analysis and human expert are common.
Further, described step S4, S5 are specially: described main affecting factors be expressed as set F:{fi|i=1,2 ..., t}, corresponding weight be expressed as set W '=wi ' | i=1,2 ..., t}.
Further, described main affecting factors F is respectively the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, cost of investment, enforcement cost, its weights W ' be respectively 0.35,0.10,0.30,0.15,0.10.
Further, described step S6 is specially: described aggregative index GI computing formula is
wherein, GIj is the aggregative index of information security effectiveness lifting scheme Pj, and Wi ' is the weight of i-th kind of factor of influence fi, and gji is the result be normalized k, and k is the value of information security effectiveness lifting scheme Pj on factor of influence fi.
Further, the account form of described parameter gji divides profit evaluation model objective attribute target attribute and cost type objective attribute target attribute two kinds, and wherein profit evaluation model objective attribute target attribute and cost type objective attribute target attribute account form are respectively:
Wherein, h
ji, h
kibe respectively jth, a kth factor of influence.
Further, described step S7 is specially: described relative aggregative index RGI computing formula is
then each information security effectiveness lifting scheme is sorted, thus draw optimized information security effectiveness lifting scheme.
The present invention compared with prior art has the following advantages: the information security measures effectiveness lifting optimal case system of selection that the present invention is based on multiple attribute decision making (MADM) is that effective implementation system information security management provides decision support, the heavy dependence to the subjective factor of personnel in information security measures effect assessment process can be alleviated, subjective error disturbance is investigated to the influence degree of net result by sensitivity analysis, namely when the internal and external factor of scheme changes, desired value is in what range, the order of having discharged is constant, thus the stability of analysis decision result and reliability, decrease the subjectivity of input data.The standardization of the measure effect assessment process that can ensure information security and the consistance of information security measures effect assessment result and trackability, reduce the complexity that information security measures effectiveness promotes optimal case selection, improve the objective confidence level that information security measures effectiveness promotes optimal case selection, its effect is all good, for the information security management activity in real network environment provides guidance.
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Accompanying drawing explanation
Fig. 1 is workflow diagram of the present invention;
Embodiment
As shown in Figure 1, a kind of information security effectiveness method for improving of multiple attribute decision making (MADM), is characterized in that, comprise the following steps:
The basic demand of S1, obtaining information system;
S2, determine alternative information security effect lifting scheme;
The efficiency index EI of S3, obtaining information safety effectiveness lifting scheme;
The main affecting factors of S4, the decision-making of comformed information safety effectiveness lifting scheme;
The weight of S5, calculating main affecting factors;
The aggregative index GI of S6, obtaining information safety effectiveness lifting scheme;
S7, to sort according to relative aggregative index RGI, select optimization information security effect lifting scheme.
In the present embodiment, described step S1 is specially: described infosystem basic demand is the basic demand meeting safe class requirement, and the unacceptable material risk of energy countermeasure system, cost is at acceptable scope and other related requests.
In the present embodiment, described step S2 is specially: determine alternative information security effectiveness lifting scheme set P:{Pj|j=1,2 ..., s}, wherein, Pj is jth kind information security effectiveness lifting scheme, and s is the quantity of the safe effectiveness lifting scheme of alternate information.
In the present embodiment, described step S3 is specially: described efficiency index EI account form is
Wherein, RLi is the risk class of risk ri, eji be information security effectiveness lifting scheme Pj to the validity of anti-risk ri, provide according to theoretical analysis, historical data, knowledge experience and actual conditions by sensitivity analysis and human expert are common.Efficiency index EI is the index of scaling information safe effectiveness lifting scheme usefulness, represents that various information security effectiveness lifting scheme is to anti-risk usefulness, and reflection information security effectiveness lifting scheme is to anti-risk resultant effect.
The risk of the infosystem of the present embodiment and the validity of information security effectiveness lifting scheme as shown in table 1.
The validity of table 1 information security effectiveness lifting scheme
The fundamental purpose that information security effectiveness lifting scheme usefulness calculates measures out various information security effectiveness lifting scheme to anti-risk relative efficacy, and sort to it, is beneficial to carry out security decision.Therefore, in order to make result more clear be convenient to contrast, use relative efficiency index to represent the relative efficacy of information security effectiveness lifting scheme here.REI is the result be normalized EI, as follows:
According to table 1 and formula (1) and (2), efficiency index and the relative efficiency index of the safe effectiveness lifting scheme of alternate information can be calculated, as shown in table 2.
The relative efficiency index of table 2 information security effectiveness lifting scheme
Protection based on security rank requirement is the hard and fast rule of infosystem.When selecting information security effectiveness lifting scheme, except considering that the safe class of infosystem requires, except the usefulness of information security effectiveness lifting scheme, safety practice utility value, also to consider to introduce the cost of investment of information security effectiveness lifting scheme, implementing the factors such as cost.For different infosystems, the influence degree that various factor pair information security effectiveness lifting scheme is selected is different, so need according to actual conditions, determine various factor of influence F:{fi|i=1,2, ..., t} and corresponding weights W '=wi ' | and i=1,2 ..., t}, wherein fi is the weight of i-th kind of factor of influence.
In the present embodiment; described main affecting factors F is respectively the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, cost of investment, enforcement cost, its weights W ' be respectively 0.35,0.10,0.30,0.15,0.10.The factor and the weight that affect the selection of information security effectiveness lifting scheme are as shown in table 3.
Table 3 affects Main Factors and the weight thereof of information security effectiveness lifting scheme
In the present embodiment, described step S6 is specially: described aggregative index GI computing formula is
wherein, GIj is the aggregative index of information security effectiveness lifting scheme Pj, and Wi ' is the weight of i-th kind of factor of influence fi, and gji is the result be normalized k, and k is the value of information security effectiveness lifting scheme Pj on factor of influence fi.
When selecting information security effectiveness lifting scheme, need to consider the many-sided factor affecting information security effectiveness lifting scheme and select, obtain information security effectiveness lifting scheme aggregative index GI with this, carry out choosing comprehensively information security effectiveness lifting scheme.According to GI, can determine, how under the prerequisite meeting the many-sided demand of infosystem, to take optimum information security effectiveness lifting scheme.
In the present embodiment, the account form of described parameter gji divides profit evaluation model objective attribute target attribute and cost type objective attribute target attribute two kinds, and wherein profit evaluation model objective attribute target attribute and cost type objective attribute target attribute account form are respectively:
Wherein, h
ji, h
kibe respectively jth, a kth factor of influence.
In the present embodiment, hj1 is the relative efficiency index of information security effectiveness lifting scheme; Hj2 is the safety practice utility value of information security effectiveness lifting scheme; Hj3 be information security effectiveness lifting scheme to the matching degree of protection based on security rank requirement, can provide according to actual conditions; Hj4 is the cost of investment of information security effectiveness lifting scheme, and hj5 is the enforcement cost of information security effectiveness lifting scheme.
According to the analysis of table 2 with assessment experts, in above-mentioned evaluated infosystem, determine any one information security effectiveness lifting scheme Pj (j=1,2, ..., s) relative to various factor of influence fi (i=1,2 ..., t) value hji and gji, according to the data message of table 2 with table 3, thus obtain the aggregative index of information security effectiveness lifting scheme, as shown in table 4.
Table 4 information security effectiveness lifting scheme aggregative index
In table 4, information security effectiveness lifting scheme has considered the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, the factor such as cost of investment and enforcement cost.
In the present embodiment, described step S7 is specially: described relative aggregative index RGI computing formula is
then each information security effectiveness lifting scheme is sorted, thus draw optimized information security effectiveness lifting scheme.As shown in table 5, the present embodiment, according to the relative aggregative index of table 5, sorts to each information security effectiveness lifting scheme.
The relative aggregative index of each information security effectiveness lifting scheme of table 5
The above; it is only preferred embodiment of the present invention; not the present invention is imposed any restrictions, every above embodiment is done according to the technology of the present invention essence any simple modification, change and equivalent structure change, all still belong in the protection domain of technical solution of the present invention.
Claims (9)
1. an information security effectiveness method for improving for multiple attribute decision making (MADM), is characterized in that, comprise the following steps:
The basic demand of S1, obtaining information system;
S2, determine alternative information security effect lifting scheme;
The efficiency index EI of S3, obtaining information safety effectiveness lifting scheme;
The main affecting factors of S4, the decision-making of comformed information safety effectiveness lifting scheme;
The weight of S5, calculating main affecting factors;
The aggregative index GI of S6, obtaining information safety effectiveness lifting scheme;
S7, to sort according to relative aggregative index RGI, select optimization information security effect lifting scheme.
2. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S1 is specially: described infosystem basic demand is the basic demand meeting safe class requirement, the unacceptable material risk of energy countermeasure system, cost is at acceptable scope and other related requests.
3. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S2 is specially: determine alternative information security effectiveness lifting scheme set P:{Pj|j=1,2, ..., s}, wherein, Pj is jth kind information security effectiveness lifting scheme, and s is the quantity of the safe effectiveness lifting scheme of alternate information.
4. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S3 is specially: described efficiency index EI account form is
wherein, RLi is the risk class of risk ri, eji be information security effectiveness lifting scheme Pj to the validity of anti-risk ri, provide according to theoretical analysis, historical data, knowledge experience and actual conditions by sensitivity analysis and human expert are common.
5. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S4, S5 are specially: described main affecting factors is expressed as set F:{fi|i=1,2 ..., t}, corresponding weight be expressed as set W '=wi ' | i=1,2 ..., t}.
6. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 5; it is characterized in that; described main affecting factors F is respectively the usefulness of information security effectiveness lifting scheme, safety practice utility value, protection based on security rank require, cost of investment, enforcement cost, its weights W ' be respectively 0.35,0.10,0.30,0.15,0.10.
7. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S6 is specially: described aggregative index GI computing formula is
wherein, GIj is the aggregative index of information security effectiveness lifting scheme Pj, and Wi ' is the weight of i-th kind of factor of influence fi, and gji is the result be normalized k, and k is the value of information security effectiveness lifting scheme Pj on factor of influence fi.
8. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 7, it is characterized in that, the account form of described parameter gji divides profit evaluation model objective attribute target attribute and cost type objective attribute target attribute two kinds, and wherein profit evaluation model objective attribute target attribute and cost type objective attribute target attribute account form are respectively:
Wherein, hji, hki are respectively jth, a kth factor of influence.
9. according to the information security effectiveness method for improving of a kind of multiple attribute decision making (MADM) according to claim 1, it is characterized in that, described step S7 is specially: described relative aggregative index RGI computing formula is
then each information security effectiveness lifting scheme is sorted, thus draw optimized information security effectiveness lifting scheme.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510338436.6A CN105005738A (en) | 2015-06-17 | 2015-06-17 | Information security effect promotion method based on multi-attribute decision |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510338436.6A CN105005738A (en) | 2015-06-17 | 2015-06-17 | Information security effect promotion method based on multi-attribute decision |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105005738A true CN105005738A (en) | 2015-10-28 |
Family
ID=54378407
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510338436.6A Pending CN105005738A (en) | 2015-06-17 | 2015-06-17 | Information security effect promotion method based on multi-attribute decision |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105005738A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107369081A (en) * | 2017-07-19 | 2017-11-21 | 无锡企业征信有限公司 | The system and method for data validity is determined with the dynamic effects factor of data source |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640914A (en) * | 2008-07-28 | 2010-02-03 | 华为技术有限公司 | Method and device for achieving network selection |
CN102781072A (en) * | 2012-07-27 | 2012-11-14 | 南京邮电大学 | Network selecting method based on multi-attribute decision-making and group decision-making |
CN102932279A (en) * | 2012-10-30 | 2013-02-13 | 北京邮电大学 | Multidimensional resource scheduling system and method for cloud environment data center |
-
2015
- 2015-06-17 CN CN201510338436.6A patent/CN105005738A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640914A (en) * | 2008-07-28 | 2010-02-03 | 华为技术有限公司 | Method and device for achieving network selection |
CN102781072A (en) * | 2012-07-27 | 2012-11-14 | 南京邮电大学 | Network selecting method based on multi-attribute decision-making and group decision-making |
CN102932279A (en) * | 2012-10-30 | 2013-02-13 | 北京邮电大学 | Multidimensional resource scheduling system and method for cloud environment data center |
Non-Patent Citations (2)
Title |
---|
刘芳: "信息***安全评估理论及其关键技术研究", 《中国优秀博硕士学位论文全文数据库(博士)信息科技辑》 * |
马俊等: "一种信息***安全性定量评估方法的研究与实现", 《计算机工程与科学》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107369081A (en) * | 2017-07-19 | 2017-11-21 | 无锡企业征信有限公司 | The system and method for data validity is determined with the dynamic effects factor of data source |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Brauers et al. | MULTIMOORA for the EU Member States updated with fuzzy number theory | |
Fathi et al. | A novel bidirectional network data envelopment analysis model for evaluating sustainability of distributive supply chains of transport companies | |
Roostaee et al. | A multi-criteria intuitionistic fuzzy group decision making method for supplier selection with VIKOR method | |
CN102930482A (en) | Investment effect evaluation method for county power distribution networks | |
Ilangkumaran et al. | Optimization of wastewater treatment technology selection using hybrid MCDM | |
Esbouei et al. | Using FANP and fuzzy VIKOR for ranking manufacturing companies based on their financial performance | |
Asadzadeh et al. | Assessing site selection of new towns using topsis method under entropy logic: A case study: New towns of tehran metropolitan region (TMR) | |
Zhang et al. | Risk assessment of water environment treatment PPP projects based on a cloud model | |
Li et al. | Stochastic interval-grey number VIKOR method based on prospect theory | |
CN110288142A (en) | A kind of engineering based on XGBoost algorithm is exceeded the time limit prediction technique | |
CN110135743A (en) | Scientific and technological achievement benefit evaluation method based on intuition fuzzy hierarchical analysis model | |
Wang et al. | Eco‐efficiency evaluation of petrochemical enterprises: An application of 3D state‐space model | |
CN105005738A (en) | Information security effect promotion method based on multi-attribute decision | |
Rochman et al. | Decision Support System of Poor Community Category in Sampang District using AHP (Analytical Hierarchy Process) | |
Hussain et al. | Micro-factors influencing site selection for small and medium enterprises (SMEs) in Saudi Arabia: Al-Hassa area using Analytical Hierarchy Process (AHP) analysis | |
Liao | Decision method of optimal investment enterprise selection under uncertain information environment | |
Roghanian et al. | An approach in BOT project selection based on fuzzy QFD and TOPSIS with consideration of risk | |
Zawora | Synthetic Assessment of Financial Situation of Local Governments in Podkarpackie Voivodeship Compared with other Polish Provinces. | |
CN101425157A (en) | Overall evaluation method for railway emergency scheme | |
Bose et al. | Application of optimized multi-criteria decision-making in an environmental impact assessment study | |
Polat | Forecasting of production and scrap amounts using artificial neural networks | |
Warid et al. | GIS-based Sustainability Assessment for Palm Oil Industry | |
Momade et al. | Modeling labor costs using artificial intelligence tools | |
ELMA | RENEWABLE ENERGY COMPANIES’RECENT OUTLOOK ON BORSA ISTANBUL WITH MOORA AND MABAC METHODS | |
Van Berkel et al. | Building Loss Given Default Scorecard Using Weight of Evidence Bins in SAS Enterprise Miner |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151028 |