2021
DOI: 10.3390/app11167668
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations

Abstract: Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…Yazdanbakhsh and Dick [ 26 ] reviewed the CFSs, Dick [ 27 ] studied the complex fuzzy logic, Nasir et al [ 28 31 ] proposed rich applications of complex fuzzy relations and its generalizations, Thirunavukarasu et al [ 32 ] proposed the applications of CFSs, Ngan et al [ 33 ] applied and represented the CIFS by quaternion numbers, Alkouri and Salleh [ 34 ] worked on complex IFRs (CIFRs), and Yaqoob et al [ 35 ] applied the CIFRs to cellular network provide companies. Jan et al [ 36 , 37 ] initiated the innovative concepts of CIFRs and IVCIFRs and proposed the applications of said concepts in the analysis of cyber-securities, cyber threats in petroleum sectors, and other industries. Lin et al [ 38 40 ] worked comprehensively on decision-making techniques in the environment of picture fuzzy information.…”
Section: Introductionmentioning
confidence: 99%
“…Yazdanbakhsh and Dick [ 26 ] reviewed the CFSs, Dick [ 27 ] studied the complex fuzzy logic, Nasir et al [ 28 31 ] proposed rich applications of complex fuzzy relations and its generalizations, Thirunavukarasu et al [ 32 ] proposed the applications of CFSs, Ngan et al [ 33 ] applied and represented the CIFS by quaternion numbers, Alkouri and Salleh [ 34 ] worked on complex IFRs (CIFRs), and Yaqoob et al [ 35 ] applied the CIFRs to cellular network provide companies. Jan et al [ 36 , 37 ] initiated the innovative concepts of CIFRs and IVCIFRs and proposed the applications of said concepts in the analysis of cyber-securities, cyber threats in petroleum sectors, and other industries. Lin et al [ 38 40 ] worked comprehensively on decision-making techniques in the environment of picture fuzzy information.…”
Section: Introductionmentioning
confidence: 99%
“…13. Let Y � y, ξ(y)e ρ ξ (y)2πi , α(y)e ρ α (y)2πi , 􏼈 η(y)e ρ η (y)2πi : y ∈ R} and Z � z, ξ(z)e ρ ξ (z)2πi , α(z)e ρ α (z)2πi , 􏼈 η(z)e ρ η (z)2πi : z ∈ R} be any CPFSs on a referential set R, then their correlation coefficient denoted by ∁' is also calculated by formula (18) or alternatively formula (19):…”
Section: Definitionmentioning
confidence: 99%
“…Yaqoob et al [16] used CIFSs in cellular network providers' corporations. Nasir et al [17][18][19] applied the CFSs, complex fuzzy relations (CFRs), and their generalizations to cybersecurity and network security. References [20][21][22] majorly worked on DM methods under the complex fuzzy information.…”
Section: Introductionmentioning
confidence: 99%
“…F A S Zhang [28] presented the origination of interval valued intuitionistic fuzzy relation (IVIFR). A Nasir et al [29] proposed the interval valued complex intuitionistic fuzzy relation (IVCIFR). According of FSs, that defines the only membership but can also covers the non-membership in [0,1].…”
Section: Introductionmentioning
confidence: 99%