An application of fuzzy algorithms in a computer access security system
1989 ◽
Vol 9
(1)
◽
pp. 39-43
◽
1998 ◽
Vol 35
(1-2)
◽
pp. 351-354
◽
2002 ◽
Vol 4
(2)
◽
pp. 125-132
◽
Keyword(s):
2003 ◽
Vol 22
(8)
◽
pp. 695-706
◽
1993 ◽
Vol 12
(7)
◽
pp. 657-662
◽
2018 ◽
Vol 7
(2.4)
◽
pp. 97
Keyword(s):
1997 ◽
Vol 48
(3)
◽
pp. 255
◽
1997 ◽
Vol 48
(3)
◽
pp. 255-263
◽
1990 ◽
Vol 12
(12)
◽
pp. 1217-1222
◽