2019
DOI: 10.1007/978-3-030-30329-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Context-Sensitive Case-Based Software Security Management System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Then, In (8) symbol I signify the unitary matrix. By applying equations (1)(2)(3)(4)(5)(6)(7)(8), the weights of every attribute with respect to all other attributes may be attained. For checking the consistency and continuing the AHP process, check the consistency ratio (CR) [31].…”
Section: C1mentioning
confidence: 99%
See 2 more Smart Citations
“…Then, In (8) symbol I signify the unitary matrix. By applying equations (1)(2)(3)(4)(5)(6)(7)(8), the weights of every attribute with respect to all other attributes may be attained. For checking the consistency and continuing the AHP process, check the consistency ratio (CR) [31].…”
Section: C1mentioning
confidence: 99%
“…Defuzzification is performed using (4)- (8). The overall weights along with their corresponding priority have been shown in Table 20.…”
Section: Implementation For Context-driven Security Modeling Criteriamentioning
confidence: 99%
See 1 more Smart Citation