Research Article

Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees

Figure 3

Triangular fuzzy number membership function image.