In the process of risk assessment, the method used to conduct the assessment plays a decisive role in the entire assessment process and the assessment conclusion. This paper introduces the basic ideas and methods of fuzzy comprehensive evaluation, gives the implementation process of fuzzy comprehensive risk assessment method, and illustrates the application of this method with examples. Keywords: information security; risk assessment; fuzzy comprehensive evaluation
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore