Filters








2,457 Hits in 5.6 sec

A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

Md Tarique Jamal Ansari, Fahad Ahmed Al-Zahrani, Dhirendra Pandey, Alka Agrawal
2020 BMC Medical Informatics and Decision Making  
The study was planned and conducted to identify the most appropriate SRE approach for quality and trustworthy software development based on the security expert's knowledge and experience.  ...  Today's healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data.  ...  Authors would also like to thank two reviewers and editor for their insightful and helpful comments and suggestions that have led to significant improvements in the paper.  ... 
doi:10.1186/s12911-020-01209-8 pmid:32948169 pmcid:PMC7502023 fatcat:2bbgj6hnfrdkrpxajfecq2mo6u

A Multicriteria Decision Making Taxonomy of IOT Security Challenging Factors

Muhammad Azeem Akbar, Ahmed Alsanad, Sajjad Mahmood, Abdulrahman Alothaim
2021 IEEE Access  
Moreover, the identified challenging factors are mapped in the core domain of IoT (i.e. smart city, smart home, smart wearable's and smart health care); and apply the fuzzy-AHP approach to rank the identified  ...  This study is contributing by providing a prioritization-based taxonomy of the IoT security challenging factors that could help the practitioners and research community to revise and develop the new strategies  ...  ACKNOWLEDGMENT The authors are grateful to the Deanship of Scientific Research, King Saud University for funding through Vice Deanship of Scientific Research Chairs.  ... 
doi:10.1109/access.2021.3104527 fatcat:z7q7xh5w7vby7frzzib5ctcnga

A state of the art fuzzy based healthcare risk management for health information exchange

Amarendar Rao Thangeda, Alfred Coleman
2019 International Journal of Engineering & Technology  
The objective of this paper is to create the state-of - the-art information security risk management. In order to accomplish this, a Fuzzy based Healthcare Risk Management is suggested.  ...  Risks of information assets have a complex nature and different approaches address risk management of information security in medial field.  ...  The objective of this paper is to create the state-of -the-art information security risk management. In order to accomplish this, a Fuzzy based Healthcare Risk Management is suggested.  ... 
doi:10.14419/ijet.v8i4.29928 fatcat:ye4yika2pnbqni5rotjtykdzeu

An Artificially Intelligent Algorithmic Paradigm for Risk Mitigation in Risk Managed Software Testing

Vinita Malik, Sukhdip Singh
2018 Journal of Data Processing  
The heart of this research pumps for a Neuro Fuzzy Framework that will be utilized for mitigating software risks and such risk mitigation will lead to test case prioritization.  ...  This approach for risk mitigation has been considered due to high accuracy levels. Here the system will be trained by Bayesian regulation approach due to high prediction capabilities.  ...  So linguistic assessment is to done by fuzzy linguistic approach.  ... 
doi:10.6025/jdp/2018/8/3/100-105 fatcat:vbhmhvr37jazhiu4ixh2jy4jgq

Agent Based Information Security Framework for Hybrid Cloud Computing

2019 KSII Transactions on Internet and Information Systems  
The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB® fuzzy logic rules were used to test the framework.  ...  In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization.  ...  Agent based approach also used to provide security to Cloud network, infrastructure and storage [12] .  ... 
doi:10.3837/tiis.2019.01.023 fatcat:kdcwjbhzajfpxag3hoo6d6fd3q

Risk Management of Secure Cloud in Higher Educational Institution

Moe Moe San, Khin May Win
2019 Zenodo  
However, a cloud provider needs to manage the cloud computing environment risks in order to identify, assess, and prioritize the risks in order to mitigate those risks, improve security and confidence  ...  The proposed framework identifies the security risk factors for higher educational institution in cloud computing and how to measure and evaluate based on Fuzzy Logic.  ...  Risk assessment and prioritization in Cloud Computing is very much essential to reduce and manage the risk and to enjoy the unlimited services of Cloud Computing.  ... 
doi:10.5281/zenodo.3590707 fatcat:gbcte22spzevrbec67kqkqmfl4

Risk-based test case prioritization using a fuzzy expert system

Charitha Hettiarachchi, Hyunsook Do, Byoungju Choi
2016 Information and Software Technology  
Conclusion: We proposed an enhanced risk-based test case prioritization approach that estimates requirements risks systematically with a fuzzy expert system.  ...  To address these limitations, our previous work [21] proposed a new requirements risk-based test case prioritization approach by considering the direct relationship between requirements risks and the test  ...  We also plan to investigate the use of other fuzzy technologies, such as the fuzzy clustering approach, to improve risk-based regression testing approaches, and plan to evaluate these approaches considering  ... 
doi:10.1016/j.infsof.2015.08.008 fatcat:ght2mnwpyzhonmliark2mzktkq

AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis

M. Fatih Ak, Muhammet Gul
2018 Complex & Intelligent Systems  
Then, TOPSIS with Pythagorean fuzzy numbers is used to prioritize previously identified risks.  ...  A comparison of the proposed approach with three approaches (classical RA method, Pythagorean fuzzy VIKOR and Pythagorean fuzzy MOORA) is also provided.  ...  However, in both studies, trapezoidal fuzzy set-based TOPSIS was applied to prioritize hazards.  ... 
doi:10.1007/s40747-018-0087-7 fatcat:zjg5rmnl7fa4ndg2u6vwrubh2e

Analysis and Ranking of IT Risk Factors Using Fuzzy TOPSIS-Based Approach

Haya Mesfer Alshahrani, Saud S. Alotaibi, Md Tarique Jamal Ansari, Mashael M. Asiri, Alka Agrawal, Raees Ahmad Khan, Heba Mohsen, Anwer Mustafa Hilal
2022 Applied Sciences  
We also carried out a multi-criteria decision-making (MCDM)-based empirical investigation to analyses and prioritized different IT risk factors.  ...  A successful approach to IT risk management would strive to protect the company and its infrastructure, not just its digital assets, to conduct their process.  ...  Acknowledgments: The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number (45/43).  ... 
doi:10.3390/app12125911 fatcat:tmtcniimerfkvmftfohpasgtjy

A Fuzzy Multi-Objective Covering-based Security Quantification Model for Mitigating Risk of Web based Medical Image Processing System

Abdullah Algarni, Masood Ahmad, Abdulaziz Attaallah, Alka Agrawal, Rajeev Kumar, Raees Ahmad
2020 International Journal of Advanced Computer Science and Applications  
We propose Fuzzy Analytic Hierarchy Process (FAHP) combined with Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in the list of criteria that affect the security assessment in medical  ...  Keywords-Web based medical image processing; fuzzy analytical hierarchy process; TOPSIS method; security management  ...  AHP Pythagorean Fuzzy used for expert judgment and TOPSIS Pythagorean Fuzzy for prioritization of identified risk.  ... 
doi:10.14569/ijacsa.2020.0110159 fatcat:i4fl4mjelnhgbbf5hibq5gcq7q

BLOCKCHAIN SECURITY : ENHANCED CONTROL EVALUATION APPROACH TO PROTECT ORGANIZATIONS' ACCOUNTING INFORMATION

Angel R. Otero
2022 Zenodo  
The proposed approach uses fuzzy set theory to prioritize business controls more precisely in organizations.  ...  It is argued that fuzzy set theory allows for a more accurate assessment of imprecise criteria than traditional assessment methodologies, and therefore generates more accurate assessments critical for  ...  ACKNOWLEDGMENTS The authors would like to thank the reviewers whose constructive critique greatly improved the quality of the paper.  ... 
doi:10.5281/zenodo.6644235 fatcat:mvxpk7m3fzhzbfvd75s2v6fecy

Identifying and Prioritizing Evaluation Criteria for User-Centric Digital Identity Management Systems

Sepideh Banihashemi, Elaheh Homayounvala, Alireza Talebpour, Abdolreza Abhari
2016 International Journal of Advanced Computer Science and Applications  
Since the answers are perception based data the most important criteria in each category are assessed by using fuzzy method.  ...  User centricity is a remarkable concept in identity management systems as it provides more powerful user control and privacy. This approach has been evolved from amending past paradigms.  ...  [28] proposed a model to evaluate and select the supplier based on fuzzy AHP approach.  ... 
doi:10.14569/ijacsa.2016.070707 fatcat:lr5rkpjvn5dcpctikynfxbz5by

A GIS-Based Risk Assessment Approach for Evaluating Shelters in Crisis Areas: Case of Idleb/Syria

Jamil HALLAK, Melik KOYUNCU, Pınar MİÇ
2021 European Journal of Science and Technology  
We included conducting risk assessment in crisis areas, identifying the risks/criteria using the Delphi technique, prioritizing risks using Interval Type-2 Fuzzy Analytic Hierarchy Process (IT2F-AHP),  ...  The aim of this paper is to propose a new approach for risk assessment in selecting shelters at humanitarian context in crisis areas by employing real data from the region.  ...  The summary of GIS-based Risk Assessment Studies containing utilized approach and problem area are presented by Table 1 below As seen from Table 1 , the framework of GIS-based risk assessment studies  ... 
doi:10.31590/ejosat.1007768 fatcat:7a3h5phsofdqvhmmezzfknbx3q

Fuzzy expert system of information security risk assessment on the example of analysis Learning Management Systems

S. Abdymanapov, M. Muratbekov, S. Altynbek, A. Barlybayev
2021 IEEE Access  
The proposed new risk assessment model has been software implemented using fuzzy logic in the form of 15 fuzzy machines.  ...  This paper proposes a new hierarchical structured model for information security risk assessment using fuzzy logic.  ...  A fuzzy approach helps to make decisions with different options, fuzziness and vulnerabilities [17] .  ... 
doi:10.1109/access.2021.3129488 fatcat:532wzp6clrgcnhzhj4lbxoddvy

INVESTIGATING THE INTERNET-OF-THINGS (IOT) RISKS FOR SUPPLY CHAIN MANAGEMENT USING Q-RUNG ORTHOPAIR FUZZY-SWARA-ARAS FRAMEWORK

Yalan Hu, Abdullah Al-Barakati, Pratibha Rani
2022 Technological and Economic Development of Economy  
The outcomes of the study show that the security and privacy risks with a weight value of 0.0572 is the main IoT risk factor for the SCM and the organization-I with the utility degree 0.8208 is the best  ...  In this paper, we evaluate and rank the IoT risks for "Supply Chain Management (SCM)" by utilizing "Stepwise Weight Assessment Ratio Analysis (SWARA)" and "Additive Ratio Assessment (ARAS)" under "q-Rung  ...  -The SWARA model is used to assess and prioritize the IoT risks for the supply chain management.  ... 
doi:10.3846/tede.2022.16583 fatcat:hean2gdvxvbknjtqra56detxli
« Previous Showing results 1 — 15 out of 2,457 results