Cybersecurity against the loopholes in industrial control systems using interval-valued complex intuitionistic fuzzy relations

Abdul Nasir, Naeem Jan, Abdu Gumaei, Sami Ullah Khan, Fahad R. Albogamy

Research output: Contribution to journalArticlepeer-review

26 Scopus citations

Abstract

Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying its effects using righteous cybersecurity. For that reason, this article introduces interval-valued complex intuitionistic fuzzy relations (IVCIFRs). For the first time in the theory of fuzzy sets, we investigated the relationships among different types of cybersecurity and the sources of cyberattacks. Moreover, the Hasse diagram for the interval-valued complex intuitionistic partial order set and relation is defined. The concepts of the Hasse diagram are used to inspect different cybersecurity techniques and practices. Then, using the properties of Hasse diagrams, the most beneficial technique is identified. Furthermore, the best possible selection of types of cybersecurity is made after putting some restrictions on the selection. Lastly, the advantages of the proposed methods are illuminated through comparison tests.

Original languageEnglish
Article number7668
JournalApplied Sciences (Switzerland)
Volume11
Issue number16
DOIs
StatePublished - 2 Aug 2021
Externally publishedYes

Keywords

  • Cybercrime
  • Cybersecurity
  • Hasse diagram
  • Interval-valued complex intuitionistic fuzzy relations
  • Interval-valued complex intuitionistic fuzzy sets

Fingerprint

Dive into the research topics of 'Cybersecurity against the loopholes in industrial control systems using interval-valued complex intuitionistic fuzzy relations'. Together they form a unique fingerprint.

Cite this