Return to Article Details Applying Data Envelopment Analysis and Analytic Hierarchy Process for Security Selection Download Download PDF