This work is licensed under the Creative Commons Attribution 4.0 International License.
Ávila, R., Khoury, R., Khoury, R., & Petrillo, F. (2021). Use of security logs for data leak detection: a systematic literature review. Security and communication networks, 2021(1), 6615899.ÁvilaR.KhouryR.KhouryR.PetrilloF. (2021). Use of security logs for data leak detection: a systematic literature review. Security and communication networks, 2021(1), 6615899.Search in Google Scholar
Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137-152.AlneyadiS.SithirasenanE.MuthukkumarasamyV. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137-152.Search in Google Scholar
Khandpur, R. P., Ji, T., Jan, S., Wang, G., Lu, C. T., & Ramakrishnan, N. (2017, November). Crowdsourcing cybersecurity: Cyber attack detection using social media. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 1049-1057).KhandpurR. P.JiT.JanS.WangG.LuC. T.RamakrishnanN. (2017, November). Crowdsourcing cybersecurity: Cyber attack detection using social media. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 1049-1057).Search in Google Scholar
Feng, D., Qin, Y., Feng, W., & Shao, J. (2014). The theory and practice in the evolution of trusted computing. Chinese science bulletin, 59, 4173-4189.FengD.QinY.FengW.ShaoJ. (2014). The theory and practice in the evolution of trusted computing. Chinese science bulletin, 59, 4173-4189.Search in Google Scholar
Alshar’e, M. I., Sulaiman, R., Mukhtar, M. R., & Zin, A. M. (2014). A user protection model for the trusted computing environment. Journal of Computer Science, 10(9), 1692.Alshar’eM. I.SulaimanR.MukhtarM. R.ZinA. M. (2014). A user protection model for the trusted computing environment. Journal of Computer Science, 10(9), 1692.Search in Google Scholar
Proudler, G., Chen, L., & Dalton, C. (2014). Trusted Computing Platforms. Springer.ProudlerG.ChenL.DaltonC. (2014). Trusted Computing Platforms. Springer.Search in Google Scholar
Rosero-Montalvo, P. D., István, Z., & Hernandez, W. (2023). A survey of trusted computing solutions using FPGAS. IEEE Access, 11, 31583-31593.Rosero-MontalvoP. D.IstvánZ.HernandezW. (2023). A survey of trusted computing solutions using FPGAS. IEEE Access, 11, 31583-31593.Search in Google Scholar
Fisher, D. A., McCune, J. M., & Andrews, A. D. (2011). Trust and trusted computing platforms. DTIC Document.FisherD. A.McCuneJ. M.AndrewsA. D. (2011). Trust and trusted computing platforms. DTIC Document.Search in Google Scholar
Smith, S. W. (2013). Trusted computing platforms: design and applications. Springer.SmithS. W. (2013). Trusted computing platforms: design and applications. Springer.Search in Google Scholar
Schellekens, D. (2012). Design and analysis of trusted computing platforms. Katholieke Universiteit Leuven.SchellekensD. (2012). Design and analysis of trusted computing platforms. Katholieke Universiteit Leuven.Search in Google Scholar
Candaele, B., Soudris, D., & Anagnostopoulos, I. (Eds.). (2015). Trusted Computing for Embedded Systems (pp. 247-269). Cham: Springer International Publishing.CandaeleB.SoudrisD.AnagnostopoulosI.(Eds.). (2015). Trusted Computing for Embedded Systems (pp. 247-269). Cham: Springer International Publishing.Search in Google Scholar
Lioy, A., & Ramunno, G. (2010). Trusted computing. In Handbook of Information and Communication Security (pp. 697-717). Berlin, Heidelberg: Springer Berlin Heidelberg.LioyA.RamunnoG. (2010). Trusted computing. In Handbook of Information and Communication Security (pp. 697-717). Berlin, Heidelberg: Springer Berlin Heidelberg.Search in Google Scholar
Liu, S., Duffy, A. H., Whitfield, R. I., & Boyle, I. M. (2010). Integration of decision support systems to improve decision support performance. Knowledge and Information Systems, 22, 261-286.LiuS.DuffyA. H.WhitfieldR. I.BoyleI. M. (2010). Integration of decision support systems to improve decision support performance. Knowledge and Information Systems, 22, 261-286.Search in Google Scholar
Bonczek, R. H., Holsapple, C. W., & Whinston, A. B. (2014). Foundations of decision support systems. Academic Press.BonczekR. H.HolsappleC. W.WhinstonA. B. (2014). Foundations of decision support systems. Academic Press.Search in Google Scholar
Sauter, V. L. (2014). Decision support systems for business intelligence. John Wiley & Sons.SauterV. L. (2014). Decision support systems for business intelligence. John Wiley & Sons.Search in Google Scholar
McIntosh, B. S., Ascough II, J. C., Twery, M., Chew, J., Elmahdi, A., Haase, D., … & Voinov, A. (2011). Environmental decision support systems (EDSS) development–challenges and best practices. Environmental Modelling & Software, 26(12), 1389-1402.McIntoshB. S.Ascough IIJ. C.TweryM.ChewJ.ElmahdiA.HaaseD.VoinovA. (2011). Environmental decision support systems (EDSS) development–challenges and best practices. Environmental Modelling & Software, 26(12), 1389-1402.Search in Google Scholar
Kasie, F. M., Bright, G., & Walker, A. (2017). Decision support systems in manufacturing: a survey and future trends. Journal of Modelling in Management, 12(3), 432-454.KasieF. M.BrightG.WalkerA. (2017). Decision support systems in manufacturing: a survey and future trends. Journal of Modelling in Management, 12(3), 432-454.Search in Google Scholar
Setiawan, N., Nasution, M. D. T. P., Rossanty, Y., Tambunan, A. R. S., Girsang, M., Agus, R. T. A., … & Nisa, K. (2018). Simple additive weighting as decision support system for determining employees salary. Int. J. Eng. Technol, 7(2.14), 309-313.SetiawanN.NasutionM. D. T. P.RossantyY.TambunanA. R. S.GirsangM.AgusR. T. A.NisaK. (2018). Simple additive weighting as decision support system for determining employees salary. Int. J. Eng. Technol, 7(2.14), 309-313.Search in Google Scholar
Nurmalini, N., & Rahim, R. (2017). Study approach of simple additive weighting for decision support system. Int. J. Sci. Res. Sci. Technol, 3(3), 541-544.NurmaliniN.RahimR. (2017). Study approach of simple additive weighting for decision support system. Int. J. Sci. Res. Sci. Technol, 3(3), 541-544.Search in Google Scholar
Sztubecka, M., Skiba, M., Mrówczyńska, M., & Bazan-Krzywoszańska, A. (2020). An innovative decision support system to improve the energy efficiency of buildings in urban Areas. Remote Sensing, 12(2), 259.SztubeckaM.SkibaM.MrówczyńskaM.Bazan-KrzywoszańskaA. (2020). An innovative decision support system to improve the energy efficiency of buildings in urban Areas. Remote Sensing, 12(2), 259.Search in Google Scholar
Holten Møller, N., Shklovski, I., & Hildebrandt, T. T. (2020, October). Shifting concepts of value: Designing algorithmic decision-support systems for public services. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (pp. 1-12).Holten MøllerN.ShklovskiI.HildebrandtT. T. (2020, October). Shifting concepts of value: Designing algorithmic decision-support systems for public services. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (pp. 1-12).Search in Google Scholar
Musen, M. A., Middleton, B., & Greenes, R. A. (2021). Clinical decision-support systems. In Biomedical informatics: computer applications in health care and biomedicine (pp. 795-840). Cham: Springer International Publishing.MusenM. A.MiddletonB.GreenesR. A. (2021). Clinical decision-support systems. In Biomedical informatics: computer applications in health care and biomedicine (pp. 795-840). Cham: Springer International Publishing.Search in Google Scholar
Farshidi, S., Jansen, S., de Jong, R., & Brinkkemper, S. (2018). A decision support system for software technology selection. Journal of Decision systems, 27(sup1), 98-110.FarshidiS.JansenS.de JongR.BrinkkemperS. (2018). A decision support system for software technology selection. Journal of Decision systems, 27(sup1), 98-110.Search in Google Scholar
Barna Biswas, Sadia Sharmin, Md Azad Hossain, Mohammad Zahidul Alam & Md Imran Sarkar. (2024). Risk Analysis-based Decision Support System for Designing Cybersecurity of Information Technology. Journal of Business and Management Studies(5),13-22.BiswasBarnaSharminSadiaHossainMd AzadAlamMohammad ZahidulSarkarMd Imran (2024). Risk Analysis-based Decision Support System for Designing Cybersecurity of Information Technology. Journal of Business and Management Studies(5),13-22.Search in Google Scholar
Zhao Hui Ren, Yuan Hao & Bang Chun Wen. (2011). A Heuristic Genetic Algorithm for Continuous Attribute Discretization in Rough Set Theory. Advanced Materials Research(211-212),132-136.RenZhao HuiHaoYuanWenBang Chun (2011). A Heuristic Genetic Algorithm for Continuous Attribute Discretization in Rough Set Theory. Advanced Materials Research(211-212),132-136.Search in Google Scholar
YUE Xima. (2024). Risk evaluation of university contract management based on rough set. Higher Education of Social Science(2),1-5.XimaYUE (2024). Risk evaluation of university contract management based on rough set. Higher Education of Social Science(2),1-5.Search in Google Scholar