Login / Signup

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3).

Hua JiangJunhu Ruan
Published in: J. Networks (2009)
Keyphrases