Which models should be applied to measure computer security and information assurance?

Leon Reznik. Which models should be applied to measure computer security and information assurance?. In The 12th IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2003, St. Louis, Missouri, USA, 25-28 May 2003. pages 1243-1248, IEEE, 2003. [doi]

@inproceedings{Reznik03,
  title = {Which models should be applied to measure computer security and information assurance?},
  author = {Leon Reznik},
  year = {2003},
  doi = {10.1109/FUZZ.2003.1206609},
  url = {http://dx.doi.org/10.1109/FUZZ.2003.1206609},
  researchr = {https://researchr.org/publication/Reznik03},
  cites = {0},
  citedby = {0},
  pages = {1243-1248},
  booktitle = {The 12th IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2003, St. Louis, Missouri, USA, 25-28 May 2003},
  publisher = {IEEE},
  isbn = {0-7803-7810-5},
}