r, s, t-spherical fuzzy VIKOR method and its application in multiple criteria group decision making
This study intends to significantly enhance the capacity of decision experts (DEs) to capture
their judgment in a larger area. In order to accomplish this, we propound the-spherical fuzzy …
their judgment in a larger area. In order to accomplish this, we propound the-spherical fuzzy …
Analysis and Application of p, q-Quasirung Orthopair Fuzzy Aczel–Alsina Aggregation Operators in Multiple Criteria Decision-Making
The, q-quasirung orthopair fuzzy set (,-ROFS) is a potent tool for representing fuzziness and
uncertainty compared to the-rung orthopair fuzzy set (-ROFS). This research aims to …
uncertainty compared to the-rung orthopair fuzzy set (-ROFS). This research aims to …
Complex T-spherical fuzzy frank aggregation operators and their application to decision making
Complex fuzzy (CF) sets (CFSs) play an important role in modeling two-dimensional
information challenges. Researchers exploring decision-making systems have recently …
information challenges. Researchers exploring decision-making systems have recently …
Analyzing the impact of cyber security related attributes for intrusion detection systems
Machine learning (ML) is one of the dominating technologies practiced in both the industrial
and academic domains throughout the world. ML algorithms can examine the threats and …
and academic domains throughout the world. ML algorithms can examine the threats and …
An optimization model for appraising intrusion-detection systems for network security communications: Applications, challenges, and solutions
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of
intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The …
intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The …
Analyze textual data: deep neural network for adversarial inversion attack in wireless networks
MA Al Ghamdi - SN Applied Sciences, 2023 - Springer
Deep neural networks (DNN) are highly effective in a number of tasks related to machine
learning across different domains. It is quite challenging to apply the information gained to …
learning across different domains. It is quite challenging to apply the information gained to …
Fabric Selection Problem Based on Sine Hyperbolic Fractional Orthotriple Linear Diophantine Fuzzy Dombi Aggregation Operators
The paper aims are to impersonate some robust sine-hyperbolic operations laws to
determine the group decision-making process under the fractional orthotriple linear …
determine the group decision-making process under the fractional orthotriple linear …
[HTML][HTML] Analytic review of healthcare software by using quantum computing security techniques
The core objective of this security research is to ensure that healthcare software (HS) is
secure when operating on a fully functional quantum computer. Developers are constantly …
secure when operating on a fully functional quantum computer. Developers are constantly …
[Retracted] The Evaluation of DDoS Attack Effect Based on Neural Network
W Guo, H Qiu, Z Liu, J Zhu… - Security and …, 2022 - Wiley Online Library
DDoS attack effect evaluation is the basis of security strategy deployment. The traditional
effect evaluation method relies on the original data, ignoring the relationship between …
effect evaluation method relies on the original data, ignoring the relationship between …
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
W Alhakami - Plos one, 2024 - journals.plos.org
The persistent evolution of cyber threats has given rise to Gen V Multi-Vector Attacks,
complex and sophisticated strategies that challenge traditional security measures. This …
complex and sophisticated strategies that challenge traditional security measures. This …