2020
DOI: 10.3390/sym12040598
|View full text |Cite
|
Sign up to set email alerts
|

Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective

Abstract: Increasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders. Developing secure software systems when there is a high demand for software products from individuals as well as the organizations is in itself a big challenge for the designers and developers. Meanwhile, adopting traditional and informal learnings to address security issues of software products has made it easier for cyber-criminals to expose … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
56
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 41 publications
(56 citation statements)
references
References 25 publications
0
56
0
Order By: Relevance
“…Obtained results from both the techniques are illustrated in Table 16 and Figure 8. The results described in Table 16 show that the results calculated from both techniques are highly correlated (person correlation coefficient is) [49][50][51]. It is clearly portrayed in Table 16 that the fuzzy-based methodology provides improved results over the classical methodology.…”
Section: Comparison With the Classical Ahp-topsis Methodsmentioning
confidence: 99%
“…Obtained results from both the techniques are illustrated in Table 16 and Figure 8. The results described in Table 16 show that the results calculated from both techniques are highly correlated (person correlation coefficient is) [49][50][51]. It is clearly portrayed in Table 16 that the fuzzy-based methodology provides improved results over the classical methodology.…”
Section: Comparison With the Classical Ahp-topsis Methodsmentioning
confidence: 99%
“…Memorability is conceptualized as a term where user may forget to how to use a system after a while, though they have taken proper training of it [32]. It is important because usability of software is reduced when user is not learnt to it.…”
Section: Memorability (Us211)mentioning
confidence: 99%
“…Reliability (US212): Reliability is the ability of security to consistently perform according to its specifications [32]. It is considered to be very important aspects while designing security.…”
Section: Memorability (Us211)mentioning
confidence: 99%
“…The share ratio of publication is 36 % for hybrid analysis in types of malware analysis approaches. The hybrid analysis includes hardware and software combination also, like Das S et al delivers hardware for malware detection online [46]. Das proposed an embedded system by combining the processor and FPGA.…”
Section: Ranking Examinationmentioning
confidence: 99%
“…4 represents the whole malware analysis types and techniques that are used for securing web applications. Authors apply a multi criteria decision making (MCDM) approach called fuzzy-Analytical Hierarchy Process (AHP) for evaluating the priority and finding the most prioritized approach and type of malware analysis [46][47][48][49][50][51][52]. Fuzzy-AHP is methodology that is pre-verified and authors has expertise in fuzzy-based various MCDM approaches through their previous experience [53][54][55][56].…”
Section: Ranking Examinationmentioning
confidence: 99%