<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Revniuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Fuzzy logic system as a component of the web application security information system⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mikolaj Karpinski</string-name>
          <email>mikolaj.karpinski@uken.krakow.pl</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Оleksandr Revniuk</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Tymoshchuk</string-name>
          <email>dmytro.tymoshchuk@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ruslan Kozak</string-name>
          <email>ruslan.o.kozak@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aizhan Tokkuliyeva</string-name>
          <email>tokkuliyeva_ak_1@enu.kz</email>
        </contrib>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>An approach to enhance the objectivity of expert evaluation of web application security using fuzzy set theory and fuzzy logic methods is presented in this paper. The proposed methodology is intended to reduce the subjectivity and uncertainty that arise when determining the weight coefficients, which reflect the importance of security criteria and requirements. The system of weight coefficients is a part of an adaptive methodology developed based on the OWASP ASVS standard for the quantitative assessment of web application security, implemented in the information system. Within the fuzzy logic system, as a component of the information system, a three-stage mechanism for aligning expert assessments has been implemented. It includes fuzzification, aggregation of fuzzy sets, and defuzzification using the center of gravity method. The results demonstrate that the proposed approach enables the generation of balanced numerical assessments that reflect the collective opinion of experts. Such a system ensures increased reliability in the analysis of web application security levels and can be integrated into cybersecurity auditing and decision-making processes.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Web applications</kwd>
        <kwd>security</kwd>
        <kwd>information system</kwd>
        <kwd>weight coefficients</kwd>
        <kwd>OWASP ASVS</kwd>
        <kwd>expert assessment</kwd>
        <kwd>fuzzy sets</kwd>
        <kwd>fuzzy logic system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Web applications have become an integral part of people’s digital lives, processing billions of
requests daily and storing vast amounts of confidential information: from personal user data to
critical business processes data. However, as the functionality and complexity of these applications
expand, so does the attack surface that malicious actors can exploit for unauthorized access, data
theft, or service disruption. Cyber threats evolve every day, and successful attacks can cause
millions of dollars in damage and irreparable harm to an organization's reputation. Therefore,
ensuring web application security is not just a technical necessity, but a critically important
element of digital strategy that determines user trust, business stability, and compliance with
regulatory requirements in the cybersecurity domain.</p>
      <p>There are few approaches to assess the security of web application, but the authors of [ 1, 2]
substantiated the relevance of quantitative metrics for assessing web application security, and
suggested an adaptive methodology for quantitative security assessment of web applications based
on OWASP ASVS standard requirements. The assessment is conducted across 13 sections and a set
of 133 selected requirements. The proposed methodology takes into account the variability of
architecture, functionality, and specific features of different web applications, particularly in the
context of security requirements, through adaptive requirement selection for each case.</p>
      <p>Different web applications have different architectures and functionalities, which determine
their security protection needs. For example, web applications that do not use API interfaces should
not receive reduced scores for lack of API requirement implementation, as these requirements are
irrelevant to them. There may be no authentication system for informational websites, making
requirements for its assessment unnecessary. To formalize the evaluation of each requirement, a
system of criteria sets was developed that ensures obtaining quantitative metrics of compliance
level for each requirement. However, criteria, like requirements, may have different weights for
each individual web application. For instance, the requirement “Verify that the password change
function requires the user’s current and new password” contains the criterion “Is there a
mechanism to verify new passwords for compliance with security requirements?” which in most
cases will have higher priority than the criterion “Is regular auditing conducted to verify the
password change process?” Comparative analysis of criteria of different nature in the context of
web security presents particular methodological complexity. It was proposed to introduce a system
of weight coefficients to take into account the significance of each requirement within a section
and criterion within a requirement. Weight coefficients have a direct impact on the resulting
assessment of the product's security level, so proper establishment of numerical values for weight
coefficients allows identification of strategically critical security parameters that require priority
resource allocation and attention. In turn, incorrect quantitative interpretation of weights can lead
to formation of wrong web application protection strategies.</p>
      <p>Therefore, the process of quantitatively determining the importance of criteria is one of the
fundamental stages of multi-criteria analysis in web application security systems. Analysis of
scientific papers [3, 4] indicates the existence of a complex of problems in the field of quantitative
expert evaluation in general. Research [5] demonstrates the inherent subjectivity of the evaluation
process, where each expert forms judgments based on individual professional experience, which
causes significant variability in numerical assessments. One of the approaches to eliminate
subjectivity in expert evaluation is the use of multiple experts’ opinions [6]. An additional
challenge is the complexity of precise numerical evaluation, when experts demonstrate instability
in choosing between adjacent values [7]. To eliminate expert uncertainty, studies often apply the
theory of fuzzy sets and fuzzy logic [8, 9]. Recent advances in minimizing hardware complexity for
cryptographic components, such as the bitsliced representation of S-Boxes using ternary logic
instructions, contribute to enhancing the security and efficiency of web applications [ 10].
Furthermore, the investigation of vulnerabilities related to broken authentication in web
applications highlights the critical need for comprehensive security assessment frameworks
capable of addressing diverse threat vectors [11]. These studies underscore the importance of
robust and adaptive security evaluation methods, such as fuzzy logic systems, to improve the
reliability of web application security assessments.</p>
      <p>The goal of our paper is to design a fuzzy logic system as part of an information system for the
quantitative security assessment of web applications, in order to overcome the uncertainty of
expert evaluations of the weight coefficients of the importance of criteria and requirements, and to
enhance the validity and reliability of the assessment results.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Design of fuzzy logic system</title>
      <p>For evaluating all values of all weight coefficients that will be used in the developed information
system by default, three experts were involved. Expert selection was carried out according to the
following criteria:


</p>
      <p>Professional competence in the field of web security.</p>
      <p>Practical experience in the field of at least 5 years.</p>
      <p>Absence of conflict of interest regarding the evaluated criteria and requirements.</p>
      <p>To implement the developed methodology, an information system was built for assessing web
application security [12]. The system supports modular architecture, personalized project
management, and result visualization, enabling its use for information security audits [12–15]. One
of the key components of the developed system is the fuzzy logic subsystem, which is designed for
processing and harmonizing expert assessments of weight coefficients for the importance of web
application security criteria and requirements. Figure 1 presents the structural diagram of the
proposed system for expert evaluation of weight coefficients for criteria and requirements.</p>
      <p>Fuzzification is the first and key step in most fuzzy logic systems. Replacing precise numerical
assessments with fuzzy sets allows to model uncertainty, what helps to create more flexible
systems.</p>
      <p>Each expert conducted independent evaluation of the importance of criteria and requirements
without the possibility of consulting with other members of the expert group, which ensured
objectivity and reliability of the obtained results. Based on the results of expert evaluation,
importance assessments of criteria and requirements were obtained on a 11-point scale from 0 to
10, where 0—absent functionality or absolutely unimportant criterion, 10—maximum importance of
the criterion. Experts often hesitate between several adjacent assessments and eventually choose
one of them. To account for expert uncertainty for intermediate scores from 1 to 9, we apply a
triangular membership function to convert the quantitative assessment of expert criterion weight
coefficients into fuzzy set:
μ ( x)= {</p>
      <p>1 , x= w
x− w + 2</p>
      <p>, w− 2 &lt; x&lt; w
2
w + 2− x</p>
      <p>
        , w &lt; x&lt; w + 2
2
0 , otherwise
, x= 1,9
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>
        This membership function does not account for extreme assessment values, therefore in cases
where an expert chose a weight coefficient value of 0, which implied the absence of certain
functionality and non-applicability of the requirement, the fuzzy set transformed into a classical set
with a single coefficient of 0:
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
      </p>
      <p>
        W = {(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ) , (
        <xref ref-type="bibr" rid="ref1">1,0</xref>
        ) , … , (w , 0 ) , … , ( 10,0 ) }= { 0 }
      </p>
      <p>If an expert assigns the maximum weight coefficient value of 10, the membership function is
proposed to be determined using the corresponding formula:</p>
      <p>
        W = {( 0,0 ) , (
        <xref ref-type="bibr" rid="ref1">1,0</xref>
        ) , … , (w , 0 ) , … ,(9 , ), (
        <xref ref-type="bibr" rid="ref1">10,1</xref>
        )}
1
2
Let us assume that after the first step, we have three fuzzy sets of expert assessments:
~
A= {x , μ~A ( x)} , x ∈ X , X = { x , 0 ≤ x ≤ 10 , xϵZ } , μ~A ( x): X →[0,1]
~
B = {x , μ~B ( x)} , x ∈ X , X = { x , 0 ≤ x ≤ 10 , xϵZ } , μ~B ( x): X →[0,1]
~
      </p>
      <p>C = {x , μ~C ( x)} , x ∈ X , X = { x , 0 ≤ x ≤ 10 , xϵZ } , μ~C ( x): X →[0,1]</p>
      <p>When different experts assess the same coefficients, there is a need for special methods to
aggregate and harmonize these judgments. In case if experts opinions scores were transformed into
fuzzy sets, some specific methods are needed to obtain a single, consolidated assessment that
reflects the collective opinion of the expert group.</p>
      <p>
        The arithmetic mean method was chosen for harmonizing expert opinions. This method
represents a compromise solution, as it provides a balance between conservative (intersection
operation) and optimistic (union operation) approaches. By calculating the mean values of the
membership function according to formula (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), we obtain a harmonized fuzzy set of expert
assessments:
μ~A,~B ,~C ( x)=
μ~A ( x)+ μ~B ( x)+ μ~C ( x)
      </p>
      <p>3</p>
      <p>When harmonizing expert opinions, it is important to remember the inconsistency of expert
opinions problem. It is crucial not only to aggregate assessments, but also to analyze the degree of
disagreement among experts. If inconsistency is too large, this may indicate the need for additional
discussions between experts or involvement of new specialists. In some cases, the harmonization
process can be iterative. After the first aggregation, results can be provided to experts for
discussion and possible correction of their initial assessments.</p>
      <p>Defuzzification is an integral part of fuzzy systems, as it allows converting fuzzy
recommendations into usual actions. Without this stage, the conclusions of the fuzzy system would
remain “blurred” and unsuitable for use in the real world. This is the final stage in the developed
fuzzy logic system, which consists of converting the fuzzy set of harmonized expert assessments
back into a precise, numerical value of the weight coefficient.</p>
      <p>
        To obtain a balanced assessment, the system used the center of gravity method and calculated
precise values of importance coefficients according to formula (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ).
      </p>
      <p>
        N
∑ xi ∙ μ ( xi)
ω = i= 0N , xi= i , N = 10 (
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
∑ μ ( xi)
i= 0
      </p>
      <p>This method calculates the “center” of the area under the membership function curve of the
output fuzzy set.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Results and discussion</title>
      <p>
        In our research, three experts were required to evaluate the importance of the studied criterion on
an 11-point scale independently. Let us consider the case when the provided assessments were 7, 8,
and 10 points, respectively. At the fuzzification stage, each integer value was converted into the
corresponding fuzzy sets using membership functions. The assessments of the first and second
experts were transformed into a fuzzy set by introducing a membership function according to
formula (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). Formula (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) was used to transform the assessment of the third expert.
      </p>
      <p>The process of converting the first expert’s quantitative assessment of 7 into a fuzzy set is
demonstrated below:
,</p>
      <p>
        A graphical representation of membership functions for all three expert’s scores is shown in
Figure 2.
The next step involved aggregating the fuzzy sets to harmonize expert opinions according to
formula (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ). The results of calculating the harmonized membership function are presented as:






x = 0…5: μ(0...5) = (0 + 0 + 0) / 3 = 0
x = 6: μ(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) = (0.5 + 0 + 0) / 3 = 0.167
x = 7: μ(
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) = (1 + 0.5 + 0) / 3 = 0.5
x = 8: μ(
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) = (0.5 + 1 + 0) / 3 = 0.5
x = 9: μ(9) = (0 + 0.5 + 0.5) / 3 = 0.333
x = 10: μ(10) = (0 + 0 + 1) / 3 = 0.333
The harmonized fuzzy set has the form:
As shown in Figure 3, the obtained values show that the maximum degree of membership (μ  = 0.5)
is achieved for values 7 and 8, which indicates the concentration of expert assessments in this
range and reflects the collective opinion regarding the priority of the estimated criterion.
      </p>
      <p>
        The final stage was defuzzification, which describes the procedure for converting the resulting
fuzzy set into a single real number with subsequent rounding for use as a weight coefficient in the
decision support system. According to formula (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), this is the weighted average of all possible
output values for the obtained aggregated fuzzy set. Substituting the values of the harmonized
fuzzy set, we get:
ω = 0 ∙ 0 + … + 5 ∙ 0 + 6 ∙ 0.167 + 7 ∙ 0.5+ 8 ∙ 0.5+ 9 ∙ 0.333 = 14.829 = 8.09
      </p>
      <p>0 + 0 + 0 + 0 + 0 + 0 + 0.167 + 0.5+ 0.5+ 0.333+ 0.333 1.833</p>
      <p>As a result of applying the fuzzy logic system for harmonizing expert assessments of criterion
importance, an importance coefficient of 8.09 was obtained, as shown in Figure 4.
For practical use in the developed information system, the importance coefficient value was
rounded to the integer 8.</p>
      <p>This result reflects the harmonized opinion of three experts, taking into account the uncertainty
of their judgments, and demonstrates the high importance of this criterion for ensuring web
application security. Such methodology allows accounting for the uncertainty of expert judgments
and provides more substantiated harmonization of different viewpoints when forming a system of
weight coefficients.</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>The proposed fuzzy logic system is a part of the developed information system, which is used for
harmonizing expert assessments of weight coefficients. It demonstrates high efficiency in solving
problems of subjectivity and uncertainty in expert evaluation. The three-stage process
(fuzzification, harmonization, and defuzzification) allowed transforming expert judgments into
substantiated quantitative metrics. Integration of the developed subsystem into the overall
architecture of the information system ensures objectivity in establishing security priorities. The
case when standard coefficients do not meet the specific requirements of a particular web
application is taken into consideration under development of information system. To ensure
methodology adaptability, the user of system has the ability to modify any weight coefficients
depending on the architecture and functionality of the web application.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>
        While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[9] A. Mardani, A. Jusoh, E. K. Zavadskas, Fuzzy Multiple Criteria Decision-Making Techniques
and Applications—Two Decades Review from 1994 to 2014, Expert Syst. With Appl. 42.8 (2015)
4126–4148. doi:10.1016/j.eswa.2015.01.003
[10] Y. Sovyn, V. Khoma, I. Opirskyy, V. Kozachok, Minimization of Bitsliced Representation of 4×4
S-Boxes based on Ternary Logic Instruction, in: Cybersecurity Providing in Information and
Telecommunication Systems, 3421, 2023, 12–24.
[11] Y. Lakh, E. Nyemkova, A. Piskozub, V. Yanishevskyi, Investigation of the Broken
Authentication Vulnerability in Web Applications, in: Proc. 11th IEEE Int. Conf. IDAACS,
Cracow, Poland, 1, 2021, 928–931.
[12] O. Revniuk, N. Zagorodna, R. Kozak, B. Yavorskyy, Development of an Information System for
the Quantitative Assessment of Web Application Security based on the OWASP ASVS
Standard, Sci. J. TNTU (Tern.) 118(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) (2025) 56–65.
[13] S. Shevchenko, Y. Zhdanova, O. Kryvytska, H. Shevchenko, Fuzzy Cognitive Mapping as a
Scenario Approach for Information Security Risk Analysis, in: Cybersecurity Providing in
Information and Telecommunication Systems II, vol. 3826, 2024, 356–362.
[14] Y. Kostiuk, P. Skladannyi, V. Sokolov, M. Vorokhob, Models and Technologies of Cognitive
Agents for Decision-making with Integration of Artificial Intelligence, in: Modern Data
Science Technologies Doctoral Consortium (MoDaST), vol. 4005 (2025) 82–96.
[15] O. Milov et al., Development of Methodology for Modeling the Interaction of Antagonistic
Agents in Cybersecurity Systems, Eastern-European J. Enterp. Technol. 2.9 (98) (2019) 56–66.
doi:10.15587/1729-4061.2019.164730
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Revniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Zahorodna</surname>
          </string-name>
          ,
          <article-title>A Methodology for the Quantitative Assessment of Web Application Security of an E-Commerce System at the Operation Stage</article-title>
          ,
          <source>Scientific Bulletin of Ivano-Frankivsk National Technical University of Oil and Gas</source>
          ,
          <volume>2</volume>
          (
          <issue>57</issue>
          ) (
          <year>2024</year>
          )
          <fpage>107</fpage>
          -
          <lpage>119</lpage>
          . doi:
          <volume>10</volume>
          .31471/1993-9965-2024-
          <volume>2</volume>
          (
          <issue>57</issue>
          )
          <string-name>
            <surname>-</surname>
          </string-name>
          107-119
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Revniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zagorodna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ulichev</surname>
          </string-name>
          ,
          <article-title>Adaptive Methodology for Computing the Quantitative Security Status Indicator of Web Applications, Cent</article-title>
          .
          <source>Ukr. Sci. Bull. Tech. Sci. 2</source>
          .
          <volume>10</volume>
          (
          <issue>41</issue>
          ) (
          <year>2024</year>
          )
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .32515/
          <fpage>2664</fpage>
          -
          <lpage>262x</lpage>
          .
          <year>2024</year>
          .
          <volume>10</volume>
          (
          <issue>41</issue>
          ).
          <volume>2</volume>
          .
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Kazimieras</given-names>
            <surname>Zavadskas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Škare</surname>
          </string-name>
          ,
          <article-title>An Overview of Fuzzy Multi-Criteria Decision-Making Methods in Hospitality and Tourism Industries: Bibliometrics, Methodologies, Applications</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          ,
          <string-name>
            <surname>Econ. Res. Istraz.</surname>
          </string-name>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>42</lpage>
          . doi:
          <volume>10</volume>
          .1080/1331677x.
          <year>2022</year>
          .2150871
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. O.</given-names>
             
            <surname>Abdulraheem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
             A. 
            <surname>Adepoju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             O. 
            <surname>Ojerinde</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
           A. 
          <article-title>Abisoye A Brief Overview on Applications of Multi-Criteria Decision Making Methods in Web Application Security</article-title>
          ,
          <source>Adv. Multidiscip. Sci. Res. J. Publ. 2</source>
          .
          <issue>2</issue>
          (
          <year>2023</year>
          )
          <fpage>59</fpage>
          -
          <lpage>66</lpage>
          . doi:
          <volume>10</volume>
          .22624/aims/csean-smart2023p8
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Levy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Fuzzy</given-names>
            <surname>Logic</surname>
          </string-name>
          <article-title>Evaluation System for Commercial Loan Analysis</article-title>
          ,
          <source>Omega 19.6</source>
          (
          <year>1991</year>
          )
          <fpage>651</fpage>
          -
          <lpage>669</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0305</fpage>
          -
          <lpage>0483</lpage>
          (
          <issue>91</issue>
          )
          <fpage>90014</fpage>
          -
          <lpage>k</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shameli-Sendi</surname>
          </string-name>
          ,
          <article-title>Fuzzy Multi-Criteria Decision-Making for Information Security Risk Assessment</article-title>
          , Open Cybern. &amp;
          <string-name>
            <surname>Syst</surname>
          </string-name>
          .
          <source>J. 6.1</source>
          (
          <year>2012</year>
          )
          <fpage>26</fpage>
          -
          <lpage>37</lpage>
          . doi:
          <volume>10</volume>
          .2174/1874110x01206010026
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shameli-Sendi</surname>
          </string-name>
          ,
          <article-title>Fuzzy Multi-Criteria Decision-Making for Information Security Risk Assessment</article-title>
          , Open Cybern. &amp;
          <string-name>
            <surname>Syst</surname>
          </string-name>
          .
          <source>J. 6.1</source>
          (
          <year>2012</year>
          )
          <fpage>26</fpage>
          -
          <lpage>37</lpage>
          . doi:
          <volume>10</volume>
          .2174/1874110x01206010026
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Baz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Alhakami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Alhakami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Hybrid</given-names>
            <surname>Fuzzy</surname>
          </string-name>
          <article-title>Rulebased Multi-Criteria Framework for Sustainable-Security Assessment of Web Application, Ain Shams Eng</article-title>
          .
          <source>J. 12.2</source>
          (
          <year>2021</year>
          )
          <fpage>2227</fpage>
          -
          <lpage>2240</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.asej.
          <year>2021</year>
          .
          <volume>01</volume>
          .003
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>