Ranking information security controls by using fuzzy analytic hierarchy process
Crossref DOI link: https://doi.org/10.1007/s10257-016-0306-y
Published Online: 2016-02-01
Published Print: 2017-02
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Khajouei, Hamid
Kazemi, Mehdi
Moosavirad, Seyed Hamed
Text and Data Mining valid from 2016-02-01