Application of fuzzy set theory to evaluate the rate of aggregative risk in information security

Organizations use different types of information system to reach their goals. Decision makers are required to allocate a security budget and treatment strategy based on the risk priority of information systems. Each of the information systems has different components or assets. However, there is dif...

Full description

Saved in:
Bibliographic Details
Main Authors: Tamjidyamcholo, Alireza, Yamchello, Hamed Tamjid, Baba, Mohd Sapiyan, Gholipour, Rahmatollah
Format: Conference or Workshop Item
Language:English
Published: IEEE 2013
Online Access:http://psasir.upm.edu.my/id/eprint/44940/1/Application%20of%20fuzzy%20set%20theory%20to%20evaluate%20the%20rate%20of%20aggregative%20risk%20in%20information%20security.pdf
http://psasir.upm.edu.my/id/eprint/44940/
Tags: Add Tag
No Tags, Be the first to tag this record!