Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations
In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS th...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi Limited
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e56e8aa8108f4d5f938307ae99800b43 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:e56e8aa8108f4d5f938307ae99800b43 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:e56e8aa8108f4d5f938307ae99800b432021-11-08T02:36:01ZAnalysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations1687-527310.1155/2021/9427492https://doaj.org/article/e56e8aa8108f4d5f938307ae99800b432021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/9427492https://doaj.org/toc/1687-5273In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS theory. In addition, the types of CPFRs are also discussed to make the paper more fruitful. Today’s complex network architecture faces the ever-changing threats. The cyber-attackers are always trying to discover, catch, and exploit the weaknesses in the networks. So, the security measures are essential to avoid and dismantle such threats. The CPFR has a vast structure composed of levels of membership, abstinence, and nonmembership which models uncertainty better than any other structures in the theory. Moreover, a CPFR has the ability to cope with multivariable problems. Therefore, this article proposes modeling techniques based on the complex picture fuzzy information which are used to study the effectiveness and ineffectiveness of different network securities against several threats and cyber-attack practices. Moreover, the strength and preeminence of the proposed methods are verified by studying their comparison with the existing methods.Abdul NasirNaeem JanSami Ullah KhanAbdu GumaeiAbdulrahman AlothaimHindawi LimitedarticleComputer applications to medicine. Medical informaticsR858-859.7Neurosciences. Biological psychiatry. NeuropsychiatryRC321-571ENComputational Intelligence and Neuroscience, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Computer applications to medicine. Medical informatics R858-859.7 Neurosciences. Biological psychiatry. Neuropsychiatry RC321-571 |
spellingShingle |
Computer applications to medicine. Medical informatics R858-859.7 Neurosciences. Biological psychiatry. Neuropsychiatry RC321-571 Abdul Nasir Naeem Jan Sami Ullah Khan Abdu Gumaei Abdulrahman Alothaim Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations |
description |
In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS theory. In addition, the types of CPFRs are also discussed to make the paper more fruitful. Today’s complex network architecture faces the ever-changing threats. The cyber-attackers are always trying to discover, catch, and exploit the weaknesses in the networks. So, the security measures are essential to avoid and dismantle such threats. The CPFR has a vast structure composed of levels of membership, abstinence, and nonmembership which models uncertainty better than any other structures in the theory. Moreover, a CPFR has the ability to cope with multivariable problems. Therefore, this article proposes modeling techniques based on the complex picture fuzzy information which are used to study the effectiveness and ineffectiveness of different network securities against several threats and cyber-attack practices. Moreover, the strength and preeminence of the proposed methods are verified by studying their comparison with the existing methods. |
format |
article |
author |
Abdul Nasir Naeem Jan Sami Ullah Khan Abdu Gumaei Abdulrahman Alothaim |
author_facet |
Abdul Nasir Naeem Jan Sami Ullah Khan Abdu Gumaei Abdulrahman Alothaim |
author_sort |
Abdul Nasir |
title |
Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations |
title_short |
Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations |
title_full |
Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations |
title_fullStr |
Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations |
title_full_unstemmed |
Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations |
title_sort |
analysis of communication and network securities using the concepts of complex picture fuzzy relations |
publisher |
Hindawi Limited |
publishDate |
2021 |
url |
https://doaj.org/article/e56e8aa8108f4d5f938307ae99800b43 |
work_keys_str_mv |
AT abdulnasir analysisofcommunicationandnetworksecuritiesusingtheconceptsofcomplexpicturefuzzyrelations AT naeemjan analysisofcommunicationandnetworksecuritiesusingtheconceptsofcomplexpicturefuzzyrelations AT samiullahkhan analysisofcommunicationandnetworksecuritiesusingtheconceptsofcomplexpicturefuzzyrelations AT abdugumaei analysisofcommunicationandnetworksecuritiesusingtheconceptsofcomplexpicturefuzzyrelations AT abdulrahmanalothaim analysisofcommunicationandnetworksecuritiesusingtheconceptsofcomplexpicturefuzzyrelations |
_version_ |
1718443240027324416 |