Research Article

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Figure 3

Vague set explanation of a real number .