2020
DOI: 10.1109/access.2020.2987941
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software

Abstract: The main idea for practicing research towards security is to maintain usability of the software as well. This can be achieved by making less complex and high secure software. Though considerable efforts have been made in this context by the developers and security experts, the standard of usable-security is not the same as it should be. Therefore, it is important to research more on the most conversant mechanisms for assessing and increasing the usable-security of software. The quantitative evaluation of usabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…Obtained results from both the techniques are illustrated in Table 16 and Figure 8. The results described in Table 16 show that the results calculated from both techniques are highly correlated (person correlation coefficient is) [49][50][51]. It is clearly portrayed in Table 16 that the fuzzy-based methodology provides improved results over the classical methodology.…”
Section: Comparison With the Classical Ahp-topsis Methodsmentioning
confidence: 99%
“…Obtained results from both the techniques are illustrated in Table 16 and Figure 8. The results described in Table 16 show that the results calculated from both techniques are highly correlated (person correlation coefficient is) [49][50][51]. It is clearly portrayed in Table 16 that the fuzzy-based methodology provides improved results over the classical methodology.…”
Section: Comparison With the Classical Ahp-topsis Methodsmentioning
confidence: 99%
“…Interrelation between software security management and context-driven ontologies Figure 1 shows the relationship between software security management, context-driven ontology, and ontology for security management. The concept of ontology plays an important role in the semantic web and particularly in universal computing and next-generation mobile communication systems [16][17][18][19][20]. Ontology can provide a better way of creating associations.…”
Section: Proposed Methods 21 Needs and Significancementioning
confidence: 99%
“…Further, after the construction of pair-wise comparisons a matrix different fuzzy operation is performed on it and then defuzzification is performed. This work used alpha cut method for defuzzification [18] where alpha cut method as formulated in (4)- (6).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to understand the scenario of malwares against web application security authors find the previous cyber-attack tends against we applications and then forecast the possible growth for future years in malware attacks through a forecasting tool called GMDH Shell DS [4]. [5][6][7]. The attack ratio shown by the authors in Fig.…”
Section: Need Of Investigationmentioning
confidence: 99%