Return to Article Details Comparison of explicit and fuzzy approaches to the solution of information security problems Download Download PDF