共 23 条
[1]
AHUJA RK, 4464432003 MIT SLOAN
[2]
[Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
[3]
[Anonymous], EXECUTIVE GUIDE INFO
[5]
BERINATO S, 2003, CIO MAGAZINE, V17, P1
[6]
Bistarelli S, 2007, APPLIED COMPUTING 2007, VOL 1 AND 2, P300, DOI 10.1145/1244002.1244073
[7]
Fire scheduling for planned artillery attack operations under time-dependent destruction probabilities
[J].
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE,
2010, 38 (05)
:383-392
[8]
*CPLEX, INTR ILOG CPLEX
[9]
Deane J., 2009, OPER MANAGE RES, V2, P4, DOI DOI 10.1007/S12063-009-0018-2
[10]
*ENDP SEC, SEC BREACH COST DOWN