Showing 1 - 2 results of 2 for search '"information security model"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises by Daoyuan LIU, Keda SUN, Junliang ZHOU, Haidong FAN

    Published 2020-03-01
    Subjects: “…electric power enterprise;network information security model;security grade evaluation;comprehensive fuzzy evaluation method;secondary fuzzy comprehensive evaluation…”
    Get full text
    Article