OWA trees and their role in security modeling using attack trees (Q2509227): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Fuzzy logic methods in recommender systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On ordered weighted averaging aggregation operators in multicriteria decisionmaking / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4346194 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A computational approach to fuzzy quantifiers in natural languages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Families of OWA operators / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Modified OWA Operator and its Use in Lossless DPCM Image Compression / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extending multicriteria decision making by mixing t-norms and OWA operators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Triangular norms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3922616 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An introduction to copulas. Properties and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bell-type inequalities for quasi-copulas / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3336431 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3281461 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the simultaneous associativity of F(x,y) and x+y-F(x,y) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Heavy OWA operators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Induced aggregation operators. / rank
 
Normal rank

Latest revision as of 20:52, 24 June 2024

scientific article
Language Label Description Also known as
English
OWA trees and their role in security modeling using attack trees
scientific article

    Statements

    Identifiers