Research Article
Investigation of E-Commerce Security and Data Platform Based on the Era of Big Data of the Internet of Things
Table 2
Vague values of each subindicator of network security.
| ā | A 11 | A 12 | A 13 | A 14 |
| P1 | [0.30, 0.40] | [0.40, 0.55] | [0.60, 0.80] | [0.50, 0.70] | P2 | [0.40, 0.75] | [0.55, 0.80] | [0.45, 0.70] | [0.35, 0.60] | P3 | [0.20, 0.30] | [0.35, 0.65] | [0.35, 0.60] | [0.55, 0.70] | P4 | [0.10, 0.20] | [0, 0] | [0, 0] | [0, 0] | P5 | [0, 0] | [0, 0] | [0, 0] | [0, 0] |
|
|