Return to Article Details An Example of of fuzzy ontology usage for risk assessment and attack impact Download Download PDF