Cargando…
Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8888100/ https://www.ncbi.nlm.nih.gov/pubmed/35242177 http://dx.doi.org/10.1155/2022/3304333 |
_version_ | 1784661058068152320 |
---|---|
author | Alothaim, Abdulrahman Hussain, Shoukat Al-Hadhrami, Suheer |
author_facet | Alothaim, Abdulrahman Hussain, Shoukat Al-Hadhrami, Suheer |
author_sort | Alothaim, Abdulrahman |
collection | PubMed |
description | Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There are various benefits of technology; it is also associated with a number of risks and dangerous threats known as cybercrimes. Cybercrime is a criminal activity that targets digital technology, like a computer, a computer network, or a mobile device. Cybersecurity is the way we reduce the risk of becoming a victim of cybercrime. Cybersecurity is the process of defending against cyberattacks. By using these concepts, we investigated the interval-valued complex T-spherical fuzzy relations (IVCT-spherical-FRs) introduced in this paper. We studied the relationships between different types of cybersecurity and the sources of cyberattacks. Furthermore, the Hasse diagram for the interval-valued complex T-spherical partial order set and relation is developed. The concepts of Hasse diagram are being used to examine various cybersecurity techniques and practices. The most effective method is identified using the features of Hasse diagrams. Finally, comparison tests are used to demonstrate the benefits of the proposed methods. |
format | Online Article Text |
id | pubmed-8888100 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-88881002022-03-02 Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information Alothaim, Abdulrahman Hussain, Shoukat Al-Hadhrami, Suheer Comput Intell Neurosci Research Article Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all over the world. Digital technology is used in varies fields, including business, industries, companies, and educational institutions. There are various benefits of technology; it is also associated with a number of risks and dangerous threats known as cybercrimes. Cybercrime is a criminal activity that targets digital technology, like a computer, a computer network, or a mobile device. Cybersecurity is the way we reduce the risk of becoming a victim of cybercrime. Cybersecurity is the process of defending against cyberattacks. By using these concepts, we investigated the interval-valued complex T-spherical fuzzy relations (IVCT-spherical-FRs) introduced in this paper. We studied the relationships between different types of cybersecurity and the sources of cyberattacks. Furthermore, the Hasse diagram for the interval-valued complex T-spherical partial order set and relation is developed. The concepts of Hasse diagram are being used to examine various cybersecurity techniques and practices. The most effective method is identified using the features of Hasse diagrams. Finally, comparison tests are used to demonstrate the benefits of the proposed methods. Hindawi 2022-02-22 /pmc/articles/PMC8888100/ /pubmed/35242177 http://dx.doi.org/10.1155/2022/3304333 Text en Copyright © 2022 Abdulrahman Alothaim et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Alothaim, Abdulrahman Hussain, Shoukat Al-Hadhrami, Suheer Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information |
title | Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information |
title_full | Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information |
title_fullStr | Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information |
title_full_unstemmed | Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information |
title_short | Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information |
title_sort | analysis of cybersecurities within industrial control systems using interval-valued complex spherical fuzzy information |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8888100/ https://www.ncbi.nlm.nih.gov/pubmed/35242177 http://dx.doi.org/10.1155/2022/3304333 |
work_keys_str_mv | AT alothaimabdulrahman analysisofcybersecuritieswithinindustrialcontrolsystemsusingintervalvaluedcomplexsphericalfuzzyinformation AT hussainshoukat analysisofcybersecuritieswithinindustrialcontrolsystemsusingintervalvaluedcomplexsphericalfuzzyinformation AT alhadhramisuheer analysisofcybersecuritieswithinindustrialcontrolsystemsusingintervalvaluedcomplexsphericalfuzzyinformation |