Return to Article Details Assessment of risk of information security by means of the theory of fuzzy sets Download Download PDF