Login / Signup
Application of Fuzzy Evaluation Methods on Campus Security Awareness.
Shu Wang
Qiang Qu
Xue-Bo Chen
Published in:
IHIET (2019)
Keyphrases
</>
evaluation methods
evaluation method
fuzzy logic
network connection
neural network
artificial intelligence
fuzzy sets
intrusion detection
fuzzy rules
information security
evaluation criteria