Research Article

Investigation of E-Commerce Security and Data Platform Based on the Era of Big Data of the Internet of Things

Table 2

Vague values of each subindicator of network security.

 A 11A 12A 13A 14

P1[0.30, 0.40][0.40, 0.55][0.60, 0.80][0.50, 0.70]
P2[0.40, 0.75][0.55, 0.80][0.45, 0.70][0.35, 0.60]
P3[0.20, 0.30][0.35, 0.65][0.35, 0.60][0.55, 0.70]
P4[0.10, 0.20][0, 0][0, 0][0, 0]
P5[0, 0][0, 0][0, 0][0, 0]