Return to Article Details Expert and fuzzy systems application for information security risks assessment of information and telecommunication systems Download Download PDF