2Zadeh,L.A.Fuzzy Sets[J].Information and Control, 1965,8:338-356. 被引量:1
3Jacob Jen-Gwo,Zesheng He.Using analytic hierarchy process and fuzzy set theory to rate and rank the disability[M].Elsevier North-Holland,Inc,199’7:1-22. 被引量:1
3Ryan J J C H, Mazzuchi T A, Ryan D J, et al. Quantifying information security risks using expert judgment elicitation [ J ]. Computers & Operations Research, 2012, 39 ( 4 ) : 774 - 784. 被引量:1
4Rakes T planning R, Deane J K, Rees L P. under uncertainty for events [ J ]. General Information, (1) :79 -88. IT security high-impact 2012, 40. 被引量:1
5Jensen F V. Bayesian networks and decision graphs [ J ]. Springer Berlin, 2001, 50 (1) :362. 被引量:1
6P Pearl J. Fusion, propagation and structuring in belief networks [ J ]. Artificial Intelligence, 1986, 29(3) :241 -288. 被引量:1
7XIAO-JUN YANG,LUAN ZENG,RAN ZHANG.CLOUD DELPHI METHOD. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems . 2012 被引量:2
8Soroush,Hossein.Risk taking in stochastic PERT networks. European Journal of Operational Research . 1993 被引量:1