Abstract
Cyber security is a basic need for every digital device such as computers, mobiles, networks, servers and electronic items. It protects digital devices from various malicious cyber-attacks or threats created over the Internet. In the digitized world, cyber security threats have been an emerging problem. In the current scenario the growth of digital devices is very high, and the risks of cyber security technologies (CST) are serious issues. These types of threats should be considered when choosing the best among cyber security technologies. For this purpose, we approach mathematically to determine the safest CST. In this paper, first we study CST and their risk factors. Then, Fermatean fuzzy sets (FFSs) are used to develop Fermatean fuzzy multi attribute border approximation area comparison (FF-MABAC) method. This method handles more uncertain decision-making problems by computing distance between each alternative and bordered approximation area (BAA). At the end of the paper, an application has been given to CST and their computing approaches are demonstrated numerically. Finally, a sensitivity analysis of results is conducted and direction for future research is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alali, M., Almogren, A., Hassan, M.M., Rassan, I.A.L., Bhuiyan, M.Z.A.: Improving risk assessment model of cyber security using fuzzy logic inference system. Comput. Secur. 74, 323–339 (2018)
Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)
Atanassov, K.T.: Intuitionistic fuzzy sets. Fuzzy Sets Syst. 20(1), 8796 (1986)
Yager, R.R.: Pythagorean fuzzy subsets. Joint IFSA World Congress and NAFIPS Annual Meeting, Edmonton, Canada (2013)
Senapati, T., Yager, R.R.: Fermatean fuzzy sets. J Ambient Intell Human Comput 11, 663–674 (2020). https://doi.org/10.1007/s12652-019-01377-0
Garg, H., Shahzadi, G., Akram, M.: Decision-making analysis based on fermatean fuzzy yager aggregation operators with application in COVID-19 testing facility. Mathematical Problems in Engineering (2020)
Wang, J., Wei, G., Wei, C., Wei, Y.: MABAC method for multiple attribute group decision making under q-rung orthopair fuzzy environment. Defence Technology 16(1), (2020). https://doi.org/10.1016/j.dt.2019.06.019
Toch, E., Bettini, C., Shmueli, E., Radaelli, L., Lanzi, A., Riboni, D., Lepri, B.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv. 51(2), 1–27 (2018)
Erdogan, M., Karasan, A., Kaya, I., Budak, A., Çolak, M.: A Fuzzy Based MCDM Methodology for Risk Evaluation of Cyber Security Technologies. In International Conference on Intelligent and Fuzzy Systems (pp. 1042-1049). Springer, Cham (2019, July). https://doi.org/10.1007/978-3-030-23756-1-123
Gartner Identifies the Top Technologies for Security in 2017. https://www.gartner.com/en/newsroom/press-releases/2017-06-14-gartner-identifies-the-top-technologies-for-security-in
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aldring, J., Ajay, D. (2022). MABAC Method for Assessment of Cyber Security Technologies Under Fermatean Fuzzy Sets. In: Bhateja, V., Tang, J., Satapathy, S.C., Peer, P., Das, R. (eds) Evolution in Computational Intelligence. Smart Innovation, Systems and Technologies, vol 267. Springer, Singapore. https://doi.org/10.1007/978-981-16-6616-2_43
Download citation
DOI: https://doi.org/10.1007/978-981-16-6616-2_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6615-5
Online ISBN: 978-981-16-6616-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)