| Applied Sciences | |
| Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations | |
| Fahad R. Albogamy1  Sami Ullah Khan2  Abdul Nasir2  Naeem Jan2  Abdu Gumaei3  | |
| [1] Computer Sciences Program, Turabah University College, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia;Department of Mathematics, Institute of Numerical Sciences, Gomal University, Dera Ismail Khan 29050, Pakistan;STC’s Artificial Intelligence Chair, Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia; | |
| 关键词: cybercrime; cybersecurity; Hasse diagram; interval-valued complex intuitionistic fuzzy relations; interval-valued complex intuitionistic fuzzy sets; | |
| DOI : 10.3390/app11167668 | |
| 来源: DOAJ | |
【 摘 要 】
Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying its effects using righteous cybersecurity. For that reason, this article introduces interval-valued complex intuitionistic fuzzy relations (IVCIFRs). For the first time in the theory of fuzzy sets, we investigated the relationships among different types of cybersecurity and the sources of cyberattacks. Moreover, the Hasse diagram for the interval-valued complex intuitionistic partial order set and relation is defined. The concepts of the Hasse diagram are used to inspect different cybersecurity techniques and practices. Then, using the properties of Hasse diagrams, the most beneficial technique is identified. Furthermore, the best possible selection of types of cybersecurity is made after putting some restrictions on the selection. Lastly, the advantages of the proposed methods are illuminated through comparison tests.
【 授权许可】
Unknown