Fig. 5From: A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software developmentCloseness coefficient graphBack to article page