Login / Signup

A more general risk assessment methodology using a soft set-based ranking technique.

Kuei-Hu Chang
Published in: Soft Comput. (2014)
Keyphrases
  • risk assessment
  • risk management
  • network security
  • risk analysis
  • real world
  • databases
  • neural network