Return to Article Details
An Example of of fuzzy ontology usage for risk assessment and attack impact
Download
Download PDF