In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS theory. In addition, the types of CPFRs are also discussed to make the paper more fruitful. Today’s complex network architecture faces the ever-changing threats. The cyber-attackers are always trying to discover, catch, and exploit the weaknesses in the networks. So, the security measures are essential to avoid and dismantle such threats. The CPFR has a vast structure composed of levels of membership, abstinence, and nonmembership which models unce...
In this manuscript, the theory of constant picture fuzzy graphs (CPFG) is developed. A CPFG is a gen...
The picture fuzzy set is an efficient mathematical model to deal with uncertain real life problems, ...
The article presents two approaches to information security risk modeling. The traditional probabili...
Recently, there has been enormous development due to advancements in technology. Industries and ente...
Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has ...
The file attached to this record is the author's final peer reviewed version.Small and large busines...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
Organizations use different types of information system to reach their goals. Decision makers are re...
The article describes a decision support system based on fuzzy inference aimed to automate the proce...
The growth of the computerization of processes and services has changed human relations and, as a co...
Online social software systems enable individuals to build representations of their network of socia...
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important ...
Vagueness and uncertainty are two distinct models are represented by Fuzzy sets and Soft sets. The c...
Cyber security risk management plays an important role for today’s businesses due to the rapidly cha...
Abstract. In this paper, we conduct research on the enhancement of computer network robustness metho...
In this manuscript, the theory of constant picture fuzzy graphs (CPFG) is developed. A CPFG is a gen...
The picture fuzzy set is an efficient mathematical model to deal with uncertain real life problems, ...
The article presents two approaches to information security risk modeling. The traditional probabili...
Recently, there has been enormous development due to advancements in technology. Industries and ente...
Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has ...
The file attached to this record is the author's final peer reviewed version.Small and large busines...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
Organizations use different types of information system to reach their goals. Decision makers are re...
The article describes a decision support system based on fuzzy inference aimed to automate the proce...
The growth of the computerization of processes and services has changed human relations and, as a co...
Online social software systems enable individuals to build representations of their network of socia...
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important ...
Vagueness and uncertainty are two distinct models are represented by Fuzzy sets and Soft sets. The c...
Cyber security risk management plays an important role for today’s businesses due to the rapidly cha...
Abstract. In this paper, we conduct research on the enhancement of computer network robustness metho...
In this manuscript, the theory of constant picture fuzzy graphs (CPFG) is developed. A CPFG is a gen...
The picture fuzzy set is an efficient mathematical model to deal with uncertain real life problems, ...
The article presents two approaches to information security risk modeling. The traditional probabili...