A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method
Based on the research of information security and business continuity management, a key business node identification model for the business process based on AE-VIKOR (Analytic hierarchy process and Entropy weighting VIKOR, AE-VIKOR) method is proposed. Fi
- PDF / 60,132,362 Bytes
- 680 Pages / 439.37 x 666.142 pts Page_size
- 22 Downloads / 213 Views
ommunications in Computer and Information Science
Frontiers in Cyber Security Third International Conference, FCS 2020 Tianjin, China, November 15–17, 2020 Proceedings
1286
Communications in Computer and Information Science Editorial Board Members Joaquim Filipe Polytechnic Institute of Setúbal, Setúbal, Portugal Ashish Ghosh Indian Statistical Institute, Kolkata, India Raquel Oliveira Prates Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil Lizhu Zhou Tsinghua University, Beijing, China
1286
More information about this series at http://www.springer.com/series/7899
Guangquan Xu Kaitai Liang Chunhua Su (Eds.) •
•
Frontiers in Cyber Security Third International Conference, FCS 2020 Tianjin, China, November 15–17, 2020 Proceedings
123
Editors Guangquan Xu Tianjin University Tianjin, China
Kaitai Liang Delft University of Technology Delft, The Netherlands
Chunhua Su University of Aizu Aizuwakamatsu, Japan
ISSN 1865-0929 ISSN 1865-0937 (electronic) Communications in Computer and Information Science ISBN 978-981-15-9738-1 ISBN 978-981-15-9739-8 (eBook) https://doi.org/10.1007/978-981-15-9739-8 © Springer Nature Singapore Pte Ltd. 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Preface
This volume contains the papers from the Third International Conference on Frontiers in Cyber Security (FCS 2020). The event was organized by the School of Cybersecurity, Tianjin University, China, which started in 2018, and brings together individuals involved in multiple disciplines of cyber security in order to foster exchange of ideas. In recent years, cyber security threats have increased rapidly. All kinds of extremely dangerous attack behaviors ex