Login / Signup
Security attribute evaluation method: a cost-benefit approach.
Shawn A. Butler
Published in:
ICSE (2002)
Keyphrases
</>
evaluation method
cost benefit
evaluation methods
evaluation model
privacy concerns
credit risk
information security
fuzzy comprehensive evaluation
access control
intrusion detection
analytic hierarchy process
data mining
data analysis
electronic commerce
network security
marine power plant