Login / Signup
A threatened-based software security evaluation method.
Mohammad Reza Razian
Hasan Mokhtari Sangchi
Published in:
ISCISC (2014)
Keyphrases
</>
evaluation method
evaluation methods
evaluation model
credit risk
fuzzy comprehensive evaluation
fuzzy comprehensive evaluation method
multiresolution
data mining
image processing
fuzzy logic
stock price
ahp method