Author of the publication

Applying Fuzzy AHP to study the KSFs of information security management.

, , , and . FUZZ-IEEE, page 2026-2032. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to manage information security in cloud computing., , and . SMC, page 1405-1410. IEEE, (2011)Fuzzy markup language for university assessment., , , , , , , and . SMC, page 954-959. IEEE, (2011)Key Success Factors Analysis of Integration of O2O into 7-Eleven Convenient Store., , , and . HCI (23), volume 11588 of Lecture Notes in Computer Science, page 38-50. Springer, (2019)The concepts of big data applied in personal knowledge management., , and . J. Knowl. Manag., 21 (1): 213-230 (2017)Biometrics technology evaluating and selecting model building., , and . Technol. Anal. Strateg. Manag., 25 (9): 1067-1083 (2013)FML-based knowledge management system for university governance and management assessment., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2012)Apply fuzzy ontology and FML to knowledge extraction for university governance and management., , , , , and . J. Ambient Intell. Humaniz. Comput., 4 (4): 493-513 (2013)Evaluating and selecting the biometrics in network security., , , and . Secur. Commun. Networks, 8 (5): 727-739 (2015)Applying Fuzzy AHP to study the KSFs of information security management., , , and . FUZZ-IEEE, page 2026-2032. IEEE, (2011)FML-based decision support system for solar energy supply and demand analysis., , , , and . FUZZ-IEEE, IEEE, (2013)