Showing 1 - 16 results of 16 for search '"security risk"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Analysis and Application of Security Risk Management Based on Business Process Granularity by Bin Tan

    Published 2013-11-01
    Subjects: “…security risk management…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Risk assessment model based on fuzzy Petri nets by Xiang GAO, Yue-fei ZHU, Sheng-li LIU, Jin-long FEI, Long LIU

    Published 2013-08-01
    Subjects: “…security risk assessment…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16