pdf

Application of Fuzzy Comprehensive Evaluation Method in Risk Assessment

  • 2013-09-19
  • 188.08KB
  • Points it Requires : 2

In the process of risk assessment, the method used to conduct the assessment plays a decisive role in the entire assessment process and the assessment conclusion. This paper introduces the basic ideas and methods of fuzzy comprehensive evaluation, gives the implementation process of fuzzy comprehensive risk assessment method, and illustrates the application of this method with examples. Keywords: information security; risk assessment; fuzzy comprehensive evaluation

unfold

You Might Like

Uploader
mamselc
 

Recommended ContentMore

Popular Components

Just Take a LookMore

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
×