2018 23rd Conference of Open Innovations Association (FRUCT) 2018
DOI: 10.23919/fruct.2018.8588107
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology-Based Context Model for Managing Security Knowledge in Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…Further, after the construction of pair-wise comparisons a matrix different fuzzy operation is performed on it and then defuzzification is performed. This work used alpha cut method for defuzzification [18] where alpha cut method as formulated in (4)- (6).…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Further, after the construction of pair-wise comparisons a matrix different fuzzy operation is performed on it and then defuzzification is performed. This work used alpha cut method for defuzzification [18] where alpha cut method as formulated in (4)- (6).…”
Section: Methodsmentioning
confidence: 99%
“…where 0 ≤α ≤ 1 and 0 ≤β≤ 1. Such that, ɳα(Loij)= (Miij-Loij).α+Loij (5) ɳα(Upij)=Upij-(Upij-Miij).α (6) Where α and β in these equations are used for the preferences of experts and intolerance of experts respectively. The values of α and β vary between 0 and 1.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations