Skip to main content

MABAC Method for Assessment of Cyber Security Technologies Under Fermatean Fuzzy Sets

  • Conference paper
  • First Online:
Evolution in Computational Intelligence

Abstract

Cyber security is a basic need for every digital device such as computers, mobiles, networks, servers and electronic items. It protects digital devices from various malicious cyber-attacks or threats created over the Internet. In the digitized world, cyber security threats have been an emerging problem. In the current scenario the growth of digital devices is very high, and the risks of cyber security technologies (CST) are serious issues. These types of threats should be considered when choosing the best among cyber security technologies. For this purpose, we approach mathematically to determine the safest CST. In this paper, first we study CST and their risk factors. Then, Fermatean fuzzy sets (FFSs) are used to develop Fermatean fuzzy multi attribute border approximation area comparison (FF-MABAC) method. This method handles more uncertain decision-making problems by computing distance between each alternative and bordered approximation area (BAA). At the end of the paper, an application has been given to CST and their computing approaches are demonstrated numerically. Finally, a sensitivity analysis of results is conducted and direction for future research is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alali, M., Almogren, A., Hassan, M.M., Rassan, I.A.L., Bhuiyan, M.Z.A.: Improving risk assessment model of cyber security using fuzzy logic inference system. Comput. Secur. 74, 323–339 (2018)

    Article  Google Scholar 

  2. Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)

    Article  MathSciNet  Google Scholar 

  3. Atanassov, K.T.: Intuitionistic fuzzy sets. Fuzzy Sets Syst. 20(1), 8796 (1986)

    Article  Google Scholar 

  4. Yager, R.R.: Pythagorean fuzzy subsets. Joint IFSA World Congress and NAFIPS Annual Meeting, Edmonton, Canada (2013)

    Book  Google Scholar 

  5. Senapati, T., Yager, R.R.: Fermatean fuzzy sets. J Ambient Intell Human Comput 11, 663–674 (2020). https://doi.org/10.1007/s12652-019-01377-0

    Article  Google Scholar 

  6. Garg, H., Shahzadi, G., Akram, M.: Decision-making analysis based on fermatean fuzzy yager aggregation operators with application in COVID-19 testing facility. Mathematical Problems in Engineering (2020)

    Google Scholar 

  7. Wang, J., Wei, G., Wei, C., Wei, Y.: MABAC method for multiple attribute group decision making under q-rung orthopair fuzzy environment. Defence Technology 16(1), (2020). https://doi.org/10.1016/j.dt.2019.06.019

  8. Toch, E., Bettini, C., Shmueli, E., Radaelli, L., Lanzi, A., Riboni, D., Lepri, B.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv. 51(2), 1–27 (2018)

    Article  Google Scholar 

  9. Erdogan, M., Karasan, A., Kaya, I., Budak, A., Çolak, M.: A Fuzzy Based MCDM Methodology for Risk Evaluation of Cyber Security Technologies. In International Conference on Intelligent and Fuzzy Systems (pp. 1042-1049). Springer, Cham (2019, July). https://doi.org/10.1007/978-3-030-23756-1-123

  10. Gartner Identifies the Top Technologies for Security in 2017. https://www.gartner.com/en/newsroom/press-releases/2017-06-14-gartner-identifies-the-top-technologies-for-security-in

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aldring, J., Ajay, D. (2022). MABAC Method for Assessment of Cyber Security Technologies Under Fermatean Fuzzy Sets. In: Bhateja, V., Tang, J., Satapathy, S.C., Peer, P., Das, R. (eds) Evolution in Computational Intelligence. Smart Innovation, Systems and Technologies, vol 267. Springer, Singapore. https://doi.org/10.1007/978-981-16-6616-2_43

Download citation

Publish with us

Policies and ethics