Return to Article Details
Assessment of risk of information security by means of the theory of fuzzy sets
Download
Download PDF