Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations

In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS th...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Abdul Nasir, Naeem Jan, Sami Ullah Khan, Abdu Gumaei, Abdulrahman Alothaim
Formato: article
Lenguaje:EN
Publicado: Hindawi Limited 2021
Materias:
Acceso en línea:https://doaj.org/article/e56e8aa8108f4d5f938307ae99800b43
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
Descripción
Sumario:In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS theory. In addition, the types of CPFRs are also discussed to make the paper more fruitful. Today’s complex network architecture faces the ever-changing threats. The cyber-attackers are always trying to discover, catch, and exploit the weaknesses in the networks. So, the security measures are essential to avoid and dismantle such threats. The CPFR has a vast structure composed of levels of membership, abstinence, and nonmembership which models uncertainty better than any other structures in the theory. Moreover, a CPFR has the ability to cope with multivariable problems. Therefore, this article proposes modeling techniques based on the complex picture fuzzy information which are used to study the effectiveness and ineffectiveness of different network securities against several threats and cyber-attack practices. Moreover, the strength and preeminence of the proposed methods are verified by studying their comparison with the existing methods.