1
Published 2013
CRC Press
Table of Contents: ... 21 -- Computer Security; Chapter 22 -- Graph Drawing for Data Analytics; Chapter 23 -- Graph Drawing...

2
Published 1983
Springer US
Table of Contents: ... of Fuzzy Set Theory to a Risk Analysis Model of Computer Security -- Fuzzy Models of Human Problem Solving...

3
Published 2016
Birkhäuser
... of areas, such as statistics, social choice theory, databases, and computer security. The contributing...