

Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets
Publisher: IGI Global_journal
E-ISSN: 1548-7725|20|3|48-69
ISSN: 1548-7717
Source: Journal of Cases on Information Technology (JCIT), Vol.20, Iss.3, 2018-07, pp. : 48-69
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content







