Cargando…

Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information

Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There...

Descripción completa

Detalles Bibliográficos
Autores principales: Alothaim, Abdulrahman, Hussain, Shoukat, Al-Hadhrami, Suheer
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8888100/
https://www.ncbi.nlm.nih.gov/pubmed/35242177
http://dx.doi.org/10.1155/2022/3304333
_version_ 1784661058068152320
author Alothaim, Abdulrahman
Hussain, Shoukat
Al-Hadhrami, Suheer
author_facet Alothaim, Abdulrahman
Hussain, Shoukat
Al-Hadhrami, Suheer
author_sort Alothaim, Abdulrahman
collection PubMed
description Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There are various benefits of technology; it is also associated with a number of risks and dangerous threats known as cybercrimes. Cybercrime is a criminal activity that targets digital technology, like a computer, a computer network, or a mobile device. Cybersecurity is the way we reduce the risk of becoming a victim of cybercrime. Cybersecurity is the process of defending against cyberattacks. By using these concepts, we investigated the interval-valued complex T-spherical fuzzy relations (IVCT-spherical-FRs) introduced in this paper. We studied the relationships between different types of cybersecurity and the sources of cyberattacks. Furthermore, the Hasse diagram for the interval-valued complex T-spherical partial order set and relation is developed. The concepts of Hasse diagram are being used to examine various cybersecurity techniques and practices. The most effective method is identified using the features of Hasse diagrams. Finally, comparison tests are used to demonstrate the benefits of the proposed methods.
format Online
Article
Text
id pubmed-8888100
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-88881002022-03-02 Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information Alothaim, Abdulrahman Hussain, Shoukat Al-Hadhrami, Suheer Comput Intell Neurosci Research Article Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There are various benefits of technology; it is also associated with a number of risks and dangerous threats known as cybercrimes. Cybercrime is a criminal activity that targets digital technology, like a computer, a computer network, or a mobile device. Cybersecurity is the way we reduce the risk of becoming a victim of cybercrime. Cybersecurity is the process of defending against cyberattacks. By using these concepts, we investigated the interval-valued complex T-spherical fuzzy relations (IVCT-spherical-FRs) introduced in this paper. We studied the relationships between different types of cybersecurity and the sources of cyberattacks. Furthermore, the Hasse diagram for the interval-valued complex T-spherical partial order set and relation is developed. The concepts of Hasse diagram are being used to examine various cybersecurity techniques and practices. The most effective method is identified using the features of Hasse diagrams. Finally, comparison tests are used to demonstrate the benefits of the proposed methods. Hindawi 2022-02-22 /pmc/articles/PMC8888100/ /pubmed/35242177 http://dx.doi.org/10.1155/2022/3304333 Text en Copyright © 2022 Abdulrahman Alothaim et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Alothaim, Abdulrahman
Hussain, Shoukat
Al-Hadhrami, Suheer
Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
title Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
title_full Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
title_fullStr Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
title_full_unstemmed Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
title_short Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
title_sort analysis of cybersecurities within industrial control systems using interval-valued complex spherical fuzzy information
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8888100/
https://www.ncbi.nlm.nih.gov/pubmed/35242177
http://dx.doi.org/10.1155/2022/3304333
work_keys_str_mv AT alothaimabdulrahman analysisofcybersecuritieswithinindustrialcontrolsystemsusingintervalvaluedcomplexsphericalfuzzyinformation
AT hussainshoukat analysisofcybersecuritieswithinindustrialcontrolsystemsusingintervalvaluedcomplexsphericalfuzzyinformation
AT alhadhramisuheer analysisofcybersecuritieswithinindustrialcontrolsystemsusingintervalvaluedcomplexsphericalfuzzyinformation