Latest version: v0.1
This package is no longer maintained.
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
The TOPSIS method. TOPSIS is based on the fundamental premise that the best solution has the shortest distance from the positive-ideal solution, and the longest distance from the negative-ideal one.
No known vulnerabilities found