Artificial Intelligence and Data Mining Approaches in Security Frameworks 2021
DOI: 10.1002/9781119760429.ch10
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Approach for Designing Security Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…The light research from Scopus with a search string "cybersecurity_X", where X is from the set {game theory, probability, Bayesian} shows {228, 41, 99} the sources respectively. The other sources contain applied approaches from Combinatorial mathematics, probabilities, and statistic [58], graphs theory [59], neural networks [60,61], fuzzy logic and fuzzy sets [62,63], and group theory in cryptography [64 -66].…”
Section: The Literature Review and Related Activitiesmentioning
confidence: 99%
“…The light research from Scopus with a search string "cybersecurity_X", where X is from the set {game theory, probability, Bayesian} shows {228, 41, 99} the sources respectively. The other sources contain applied approaches from Combinatorial mathematics, probabilities, and statistic [58], graphs theory [59], neural networks [60,61], fuzzy logic and fuzzy sets [62,63], and group theory in cryptography [64 -66].…”
Section: The Literature Review and Related Activitiesmentioning
confidence: 99%