Return to Article Details
Expert and fuzzy systems application for information security risks assessment of information and telecommunication systems
Download
Download PDF