2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2016
DOI: 10.1109/smc.2016.7844770
|View full text |Cite
|
Sign up to set email alerts
|

Ranking criteria based on fuzzy ANP for assessing E-commerce web sites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…The attributes of react and recover from attacks are revoke access, lock computer, inform actors, maintain audit trail, and availability and are represented as F31, F32, F33,F34, and F35, respectively, in the tables given below. Software security assessment using fuzzy-ANP-TOPSIS has been examined by applying these Equations (1)- (20) as follows:…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…The attributes of react and recover from attacks are revoke access, lock computer, inform actors, maintain audit trail, and availability and are represented as F31, F32, F33,F34, and F35, respectively, in the tables given below. Software security assessment using fuzzy-ANP-TOPSIS has been examined by applying these Equations (1)- (20) as follows:…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
“…Authors accumulated network structure to determine the weights of security attributes with respect to design tactics, using the data collected. Software development experts provided the answers by assigning scores according to the scale shown in Table 1 to the attributes that influenced each other in a measurable way [20]. First, views were taken from fifty academics and industry experts who had a wealth of expertise in security design and maintenance for each collection of attributes and related data.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations