<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cyber Security Criteria: Fuzzy AHP approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dušan J. Simjanović</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nenad O. Vesić</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Branislav M. Randjelović</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Djordjije Vujadinović</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Electronic Engineering, University of Niš</institution>
          ,
          <addr-line>Aleksandra Medvedeva 14, 18000 Niš</addr-line>
          ,
          <country country="RS">Serbia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Faculty of Science and Mathematics, University of Montenegro</institution>
          ,
          <addr-line>Podgorica</addr-line>
          ,
          <country country="ME">Montenegro</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Mathematical Institute of the Serbian Academy of Sciences and Arts</institution>
          ,
          <addr-line>Kneza Mihaila 36, Belgrade</addr-line>
          ,
          <country country="RS">Serbia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>One of the main Cyber security's task is to ensure the real time protection of information and networks. In the last decade the number of cyber security attacks and its frequency has increased, creating the need for new data protection systems. In this paper we present two groups of criteria with a total of eight sub-criteria afecting cyber security, and their ranking using Fuzzy AHP. The Data/password leak, Fishing detection and DoS attack detection are recognized as the most important sub-criteria.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cyber security</kwd>
        <kwd>criteria</kwd>
        <kwd>AHP</kwd>
        <kwd>Fuzzy AHP</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>2.1. Triangular fuzzy numbers</title>
        <p>The information is always considered as an important Let all fuzzy sets defined on the set of real numbers R be
part in the sustainable success competitivness. The rapid represented as  (R). The number  ∈  (R) is a fuzzy
development of IoT, cloud computing and data transfer, number if there exists 0 ∈ R so condition  (0) = 1
influencing the thinking of people and changing their holds, and  = [︀ ,   () ≥  ]︀ is a closed interval
lifestyle increase the number of exploitable vulnerabili- for every  ∈ [0, 1] [1]. The membership function, a
ties. To ensure real-time protection of information and component of a triangular fuzzy number (TFN) , is a
information systems from intruders, organizations spent function   : R → [0, 1], defined as
a lot of efort and resources in determining the
intrusbiroenacchrietseroivaedrettheremlainstattwioon.dTehcaedneusmisbceornosftcaynbtleyrsienccureriatsy-  () = ⎨⎧ ((− − ))//((− − )),,  ≤ ≤ ≤ ≤ ,,
ing, and diferent approaches and techniques have been ⎩ 0, otherwise,
introduced by researchers and experts to implement
robust security mechanisms. Defining and ranking of
criteria afecting intrusion systems become challenging issue
for researchers and cyber security experts often applying
some of the MCDM approaches.</p>
        <p>= (1 − 2, 1 − 2, 1 − 2),
˜ ˜
1 ⊗ 2 = (1, 1, 1) ⊗ (2, 2, 2)</p>
        <p>= (1 · 2, 1 · 2, 1 · 2),
 · ˜1 =  · (1, 1, 1) = ( · 1,  · 1,  · 1),
˜−1 1 = (1, 1, 1)− 1 = (1/1,1/1,1/1).
given as</p>
        <p>For a given triangular number ˜ = (, , ) the left
side of the membership function  ˜ and it’s inverse are
 ˜ = ( − )/( − ); ( ˜)− 1</p>
        <p>=  + ( − ),  ∈ [0, 1],
it’s inverse are given as
and the right side of the membership function  ˜ and
 ˜ = ( − )/( − ); ( ˜)− 1
=  + ( − ),  ∈ [0, 1].</p>
        <p>∫︁ 1
0</p>
        <p>( ˜)− 1
is
 (˜) =  (˜) + (1 −  )(˜)

= 
=
1
2
∫︁ 1
0</p>
        <p>( ˜)− 1 + (1 −  )
( +  + (1 −  )) .</p>
        <p>where  represents an optimism index. The optimistic
( = 1), balanced (
= 0.5) and pessimistic (</p>
        <p>= 0)
point of view are significant to obtain and rank criteria,
while semi-pessimistic (</p>
        <p>= 0.25) and semi-optimistic
(</p>
        <p>= 0.75) point of view are used when additional
opinion is needed or more accurate results required [5].</p>
      </sec>
      <sec id="sec-1-2">
        <title>2.2. Fuzzy AHP</title>
        <p>
          Since its creation [6], the Analytic Hierarchy Process
(AHP) had a respectable application in MCDM, enabling
the decision makers to solve complex problems by
decomposing them into a hierarchical structure, creating the
comparison matrix and determining the importance of
one indicator above others. The specified level of
uncertainty of a team of experts (or even one expert) [7] due to
the inability to express the significance of some criteria
has led to the introduction of Fuzzy AHP [8, 9] enabling
0
2
4
6
8
10
12
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) Figure 1: Graphic representation of triangular fuzzy numbers.
        </p>
        <p>The total integral value, according to [4] as a
combination of left and right integral values (˜) and (˜), of TFNs. In this step, a positive fuzzy reciprocal
comparexpressions.
Determining the pairwise comparison matrix ̃︀ in terms
conversion of linguistic statements into mathematical should be found and calculations repeated [14].</p>
        <p>The phases in FAHP can be summarized as follows</p>
        <p>
          Using the triangular fuzzy numbers from the comparison
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
1.0
0.5
0.0
(
          <xref ref-type="bibr" rid="ref1 ref1 ref3">1,1,3</xref>
          )
(
          <xref ref-type="bibr" rid="ref1 ref2 ref3">1,2,3</xref>
          )
(
          <xref ref-type="bibr" rid="ref1 ref3">1,3,5</xref>
          )
(
          <xref ref-type="bibr" rid="ref3 ref4">3,4,5</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3,5,7</xref>
          )
(5,6,7)
(5,7,9)
(7,8,9)
(7,9,9)
˜
ison matrix ̃︀ = (˜ )×  with a total of ( − 1)/2
comparisons of elements from a higher level with
elements from a lower level is developed. The fuzzy value
 represents the degree of relative importance between
criteria;  = , ˜ = (
          <xref ref-type="bibr" rid="ref1 ref1 ref1">1, 1, 1</xref>
          ), and ˜ = 1/˜,
otherwise.
comparisons.
        </p>
        <p>As it was recommended in [11], a fuzzy distance of 2
and odd values as boundaries for all non-intermediate
values are applied in order to achieve better consistency.</p>
        <p>There are also diferent scales of triangular fuzzy numbers
applicable in the previous case [12, 13].</p>
        <p>The graphic representation of the used FAHP scale
with all three values (lower, median, and upper) is
presented in Figure 1.</p>
        <p>Phase III: Matrix consistency review
For a matrix  = ( )× , the consistency index 
and consistency ratio  are calculated using equations
  −</p>
        <p>− 1
 =
,  =


,</p>
        <p>(5)
where  max corresponds to a maximal eigenvalue of
matrices  and  is a random index, as shown in Table
2. The  values for matrices of dimensions of one and
two are equal to zero.</p>
        <p>The value  &lt; 0.1 confirms the comparison matrix
consistency, while otherwise the reason for inconsistency</p>
        <p>Phase IV: The fuzzification phase
matrix ̃︀ = (︀ ˜ × 
︀)</p>
        <p>, applying
and</p>
        <p />
        <p>
          TFNs
(
          <xref ref-type="bibr" rid="ref1 ref1 ref3">1, 1, 3</xref>
          )
(
          <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
          )
(
          <xref ref-type="bibr" rid="ref1 ref3">1, 3, 5</xref>
          )
(
          <xref ref-type="bibr" rid="ref3 ref4">3, 4, 5</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3, 5, 7</xref>
          )
(5, 6, 7)
(5, 7, 9)
(7, 8, 9)
(7, 9, 9)
1˜− 1
2˜− 1
3˜− 1
4˜− 1
5˜− 1
6˜− 1
7˜− 1
8˜− 1
9˜− 1
        </p>
        <p>Inverse TFNs
(1/3, 1, 1)
(1/3, 1/2, 1)
(1/5, 1/3, 1)
(1/5, 1/4, 1/3)
(1/7, 1/5, 1/3)
(1/7, 1/6, 1/5)
(1/9, 1/7, 1/5)
(1/9, 1/8, 1/7)
(1/9, 1/9, 1/7)</p>
        <sec id="sec-1-2-1">
          <title>Matrix</title>
        </sec>
        <sec id="sec-1-2-2">
          <title>Dimension</title>
          <p />
        </sec>
        <sec id="sec-1-2-3">
          <title>Three</title>
          <p>0.58</p>
        </sec>
        <sec id="sec-1-2-4">
          <title>Four</title>
          <p>0.90</p>
        </sec>
        <sec id="sec-1-2-5">
          <title>Five</title>
          <p>1.12
Six
1.24</p>
        </sec>
        <sec id="sec-1-2-6">
          <title>Seven</title>
          <p>1.32</p>
        </sec>
        <sec id="sec-1-2-7">
          <title>Eight</title>
          <p>1.41</p>
        </sec>
        <sec id="sec-1-2-8">
          <title>Nine</title>
          <p>1.45</p>
          <p>Ten
1.49
the value of the fuzzy synthetic extent is obtained as</p>
          <p>3. Literature preview and Cyber
− 1 =
︃(  
∑︁ ∑︁ ˜
̃︀ = ∑︁ ˜</p>
          <p>⊗ − 1

=1

=1
= ∑︁ ( ,  ,  ) ⊗ − 1,  = 1, .</p>
          <p>Phase V: The defuzzification phase
The defuzzification phase starts with the weighted vector
 in order to obtain the total integral value for the TFNs,
̃︀ [15]
1
2

 =  (̃︀) =</p>
          <p>︀(   +  + (1 −  ))︀ ,
 ∈ [0, 1],  = 1, ,
Phase VI: Normalization phase
criteria are obtained.</p>
          <p>* =


∑︀ 
=1
(10)
(7)
(8)
(9)</p>
          <p>Phase VII: Ranking phase
The weights for each sub-criterion are obtained by
multiplying the weights of the criteria and sub-criteria. Then,
arranging the obtained weights, the sub-criteria ranking
is received.</p>
          <p>security criteria
In this section the literature preview of security
indicators followed by selected criteria will be given.</p>
          <p>The internet changed the concept of computing as we
know it, enlarging the number of possibilities and
opportunities, which lead to the higher number of risks,
possible vulnerabilities and system breakthroughs.
Computer security primarily focuses on protecting a specific
source or valuable data and information within a
single computer device. Security is defined as the reaction
taken to security threats resulting from a harmful act by
some people [16]. AHP and its various generalizations
(MCDM approaches) ofer a lot of potential in the
process of solving hierarchical decision-making problems.</p>
          <p>Since Saaty proposed it, AHP method was used to
calcuIn the normalization phase, the weight vectors * for late the weights of criteria significantly advancing this
3˜− 1
4˜− 1
5˜− 1
X21
2˜− 1
3˜− 1
5˜− 1
2˜− 1
4˜− 1
2˜− 1
4˜− 1
3˜− 1
2˜− 1
process in finding the decision that best matches given
conditions. Some of the recent publications regarding
security criteria are published by Almotiri [17] exploring
the efectiveness of malicious trafic detention systems,
Goutam et al [18] established techniques for identifying
shortcoming of online applications, Agarwal et al tested
university’s software security using ANP-TOPSIS
evaluation [19]. The AHP-TOPSIS based approach dealed with
healthcare electronic service quality making the
interactivity, service correctness, and responsiveness the most
important characteristics in providing satisfying and
effective healthcare web services was presented in [20],
while in [21] using the same methodology under hesitant
fuzzy conditions Sahu presented a novel framework for
software durability assessment. Alharbe [22] also used
MCDM approaches in recognizing and prioritizing usable
security attributes while designing and developing the
software, and in [23] authors determined and prioritized
confidence parameters in fog computing.</p>
          <p>In the sequel we present criteria and sub-criteria
related to cyber secutity.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Results and conclusion</title>
      <p>Applying the AHP and the FAHP method presented
in previous section, ranking of main criteria is ob- attacks, which corresponds to results presented in [24].
tained.</p>
      <p>The pairwise comparison matrix for main
criteria is consistent since 
=</p>
      <p>Obtained
weights (1)
=</p>
      <p>0.666666667 and (2)
0.333333333 in the case of AHP and (1)
=
=</p>
      <p>The highest ranked sub-criteria in PDM group is
approximately 7.39 times higher than lowest ranked sub-criteria
in the AHP case, and 6.77 higher in the balanced FAHP
case.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Milošević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Milošević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Simjanović</surname>
          </string-name>
          ,
          <article-title>Implementation of adjusted fuzzy AHP method in the assessment for reuse of industrial buildings</article-title>
          ,
          <source>Mathematics</source>
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>1697</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>C.-C. Sun</surname>
          </string-name>
          ,
          <article-title>A performance evaluation model by integrating fuzzy AHP and fuzzy TOPSIS methods</article-title>
          ,
          <source>Expert systems with applications 37</source>
          (
          <year>2010</year>
          )
          <fpage>7745</fpage>
          -
          <lpage>7754</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.-Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>Applications of the extent analysis method on fuzzy AHP, European journal of operaFigure 3: Sub-criteria final ranking</article-title>
          .
          <source>tional research 95</source>
          (
          <year>1996</year>
          )
          <fpage>649</fpage>
          -
          <lpage>655</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kulak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Durmuşoğlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kahraman</surname>
          </string-name>
          ,
          <article-title>Fuzzy multi-attribute equipment selection based on inSub-criteria X21-DoS attack detection representing op- formation axiom, Journal of materials processing portunity for interrupting the functioning of the system technology 169 (</article-title>
          <year>2005</year>
          )
          <fpage>337</fpage>
          -
          <lpage>345</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>and system resource access for its users has the highest</article-title>
          [5]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Simjanović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. O.</given-names>
            <surname>Vesić</surname>
          </string-name>
          ,
          <article-title>On the rank with the weight vector (21) = 0.475835435 in factors of successful e-commerce platform design the AHP case and median vector for all three FAHP cases during and after covid-19 pandemic using extended (2) = 0.447265348, followed by sub-criteria X22- fuzzy ahp method</article-title>
          ,
          <source>Axioms</source>
          <volume>11</volume>
          (
          <year>2022</year>
          )
          <fpage>105</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Ransomware</surname>
            <given-names>detection</given-names>
          </string-name>
          , (22) =
          <fpage>0</fpage>
          .
          <issue>288398487</issue>
          [6]
          <string-name>
            <given-names>T. L.</given-names>
            <surname>Satty</surname>
          </string-name>
          ,
          <source>The Analytic Hierarchy Process, aMnadlwa</source>
          r(ed2e2te)ction,b(einga)cod=ed fil0e.
          <source>3th0a5t55is29sp0r4e.ad Xb2y3- [7] TM.cWGraaaws</source>
          ,-HJ. iHll uIngtée,rTn.atBioloncakl,, NT.ewWrYiogrhkt,,
          <year>1F9</year>
          .8B0e.
          <article-title>nitezcyber-attackers through diferent messaging systems re- Capistros, A. Verbruggen, Sustainability assessquiring the victim to execute it and making damage in ment and indicators: Tools in a decision-making the system is ranked third in all observed cases. Anomaly strategy for sustainable development, Sustainabildetection, the sub-criteria X24 is on the bottom of the ity 6 (</article-title>
          <year>2014</year>
          )
          <fpage>5512</fpage>
          -
          <lpage>5534</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>ladder having 5</source>
          .
          <article-title>85 times lowest rank than the X21 in [8</article-title>
          ]
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Yager</surname>
          </string-name>
          ,
          <article-title>Uncertainty modeling using fuzzy meathe AHP case, and the 5.89 lowest rank in the optimistic sures</article-title>
          ,
          <source>Knowledge-Based Systems</source>
          <volume>92</volume>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>FAHP case. All of these sub-criteria belong to the HSI [9</article-title>
          ]
          <string-name>
            <given-names>D.-F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>An approach to fuzzy multiattribute degroup and the rankin result can be seen in Table 4. The cision making under uncertainty, Information Sciifnal ranking of sub-criteria is obtained multiplying the ences 169 (</article-title>
          <year>2005</year>
          )
          <fpage>97</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>weights of main criteria by in-group sub-criteria weights</article-title>
          . [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Kahraman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Cebeci</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>Ruan, Multi-attribute As it was presented in Figure 3, the sub-criteria from X1, comparison of catering service companies using namely X11 and X12 are ranked first and second in AHP fuzzy AHP: The case of Turkey, International jourand all FAHP cases, while X13 andX14 ranked fourth and nal of production economics 87 (</article-title>
          <year>2004</year>
          )
          <fpage>171</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <article-title>seventh in the AHP, and third and sixth (fifth</article-title>
          ) in the [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Srdjevic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. D. P.</given-names>
            <surname>Medeiros</surname>
          </string-name>
          ,
          <article-title>Fuzzy AHP assesspessimistic and balanced (optimistic) point of view in the ment of water management plans, Water Resources FAHP case. The fourth and seventh rank of sub-criteria Management 22 (</article-title>
          <year>2008</year>
          )
          <fpage>877</fpage>
          -
          <lpage>894</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>X21 and X23 is valid for all FAHP cases</article-title>
          , while sub-criteria [12]
          <string-name>
            <surname>T.-Y. Chou</surname>
          </string-name>
          , Y.-T. Chen,
          <article-title>Applying fuzzy AHP and X24 lies at the bottom of the ladder for both, AHP and TOPSIS method to identify key organizational caFAHP cases</article-title>
          .
          <source>pabilities, Mathematics</source>
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>836</fpage>
          . [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ghorui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Algehyne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Mondal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Saha</surname>
          </string-name>
          ,
          <article-title>Ahp-topsis inspired shopping mall site Acknowledgments selection problem with fuzzy data</article-title>
          ,
          <source>Mathematics</source>
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>1380</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <article-title>This paper was supported in part by the Blockchain Tech-</article-title>
          [14]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Milošević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Milošević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Stanojević</surname>
          </string-name>
          , nology Laboratory at Belgrade Metropolitan University,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Stević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Simjanović</surname>
          </string-name>
          ,
          <article-title>Fuzzy and interval Belgrade, Serbia and in part by the Serbian Ministry of Ed- ahp approaches in sustainable management for the ucation, Science and Technological Development through architectural heritage in smart cities</article-title>
          ,
          <source>Mathematics Mathematical Institute of the Serbian Academy of Sci- 9</source>
          (
          <year>2021</year>
          )
          <fpage>304</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          ences and Arts. [15]
          <string-name>
            <surname>T.-S. Liou</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-J. J. Wang</surname>
          </string-name>
          ,
          <article-title>Ranking fuzzy numbers with integral value</article-title>
          ,
          <source>Fuzzy sets and systems 50</source>
          (
          <year>1992</year>
          )
          <fpage>247</fpage>
          -
          <lpage>255</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Abdel-Basset</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gamal</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. M. Sallam</surname>
            , I. Elgendi,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Munasinghe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Jamalipour</surname>
          </string-name>
          ,
          <article-title>An optimization model for appraising intrusion-detection systems for network security communications: Applications, challenges, and solutions</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <fpage>4123</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Almotiri</surname>
          </string-name>
          ,
          <article-title>Integrated fuzzy based computational mechanism for the selection of efective malicious trafic detection approach</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>10751</fpage>
          -
          <lpage>10764</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Goutam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          ,
          <article-title>Vulnerability assessment and penetration testing to enhance the security of web application</article-title>
          ,
          <source>in: 2019 4th International Conference on Information Systems and Computer Networks (ISCON)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>601</fpage>
          -
          <lpage>605</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Seh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Baz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Alhakami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Alhakami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Baz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>Software security estimation using the hybrid fuzzy anp-topsis approach: design tactics perspective</article-title>
          ,
          <source>Symmetry</source>
          <volume>12</volume>
          (
          <year>2020</year>
          )
          <fpage>598</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>G.</given-names>
            <surname>Büyüközkan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Çifçi</surname>
          </string-name>
          ,
          <article-title>A combined fuzzy ahp and fuzzy topsis based strategic analysis of electronic service quality in healthcare industry</article-title>
          ,
          <source>Expert systems with applications 39</source>
          (
          <year>2012</year>
          )
          <fpage>2341</fpage>
          -
          <lpage>2354</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sahu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Alzahrani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Hesitant fuzzy sets based symmetrical model of decision-making for estimating the durability of web application</article-title>
          ,
          <source>Symmetry</source>
          <volume>12</volume>
          (
          <year>2020</year>
          )
          <fpage>1770</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>N.</given-names>
            <surname>Alharbe</surname>
          </string-name>
          ,
          <article-title>A fuzzy-delphi based decision-making process for measuring usable-security of web based smart hospital management system</article-title>
          ,
          <source>ICIC Express Lett</source>
          <volume>14</volume>
          (
          <year>2020</year>
          )
          <fpage>15</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Ogundoyin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Kamil</surname>
          </string-name>
          ,
          <article-title>A fuzzy-ahp based prioritization of trust criteria in fog computing services</article-title>
          ,
          <source>Applied Soft Computing</source>
          <volume>97</volume>
          (
          <year>2020</year>
          )
          <fpage>106789</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Seh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Alosaimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Alyami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>Analyzing the impact of cyber security related attributes for intrusion detection systems</article-title>
          ,
          <source>Sustainability</source>
          <volume>13</volume>
          (
          <year>2021</year>
          )
          <fpage>12337</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>