{"id":"https://openalex.org/W4413637510","doi":"https://doi.org/10.1007/s10207-025-01107-y","title":"A fuzzy logic-based trust framework against sybil and rank attacks in cyber-physical systems","display_name":"A fuzzy logic-based trust framework against sybil and rank attacks in cyber-physical systems","publication_year":2025,"publication_date":"2025-08-26","ids":{"openalex":"https://openalex.org/W4413637510","doi":"https://doi.org/10.1007/s10207-025-01107-y"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01107-y","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-025-01107-y","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116087073","display_name":"Asim Noor","orcid":null},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Asim Noor","raw_affiliation_strings":["Department of Avionics Engineering, Air University, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Avionics Engineering, Air University, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008277736","display_name":"Noshina Tariq","orcid":"https://orcid.org/0000-0002-9754-253X"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Noshina Tariq","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, National University of Computer and Emerging Sciences, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, National University of Computer and Emerging Sciences, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088597454","display_name":"Muhammad Asim","orcid":"https://orcid.org/0000-0002-2894-7891"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Asim","raw_affiliation_strings":["Department of Cyber Security, National University of Computer and Emerging Sciences, Islamabad, 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, National University of Computer and Emerging Sciences, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018881921","display_name":"Farrukh Aslam Khan","orcid":"https://orcid.org/0000-0002-7023-7172"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Farrukh Aslam Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, DSR, King Saud University, Riyadh, 11653, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, DSR, King Saud University, Riyadh, 11653, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070343465","display_name":"Javed Ali Khan","orcid":"https://orcid.org/0000-0003-3306-1195"},"institutions":[{"id":"https://openalex.org/I141584323","display_name":"University of Hertfordshire","ror":"https://ror.org/0267vjk41","country_code":"GB","type":"education","lineage":["https://openalex.org/I141584323"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Javed Ali Khan","raw_affiliation_strings":["Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hertfordshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hertfordshire, United Kingdom","institution_ids":["https://openalex.org/I141584323"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019049253","display_name":"Alexios Mylonas","orcid":"https://orcid.org/0000-0001-8819-5831"},"institutions":[{"id":"https://openalex.org/I141584323","display_name":"University of Hertfordshire","ror":"https://ror.org/0267vjk41","country_code":"GB","type":"education","lineage":["https://openalex.org/I141584323"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alexios Mylonas","raw_affiliation_strings":["Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hertfordshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hertfordshire, United Kingdom","institution_ids":["https://openalex.org/I141584323"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5116087073"],"corresponding_institution_ids":["https://openalex.org/I899713450"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":3.1905,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93056684,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"24","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7541424036026001},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.6701684594154358},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6643427610397339},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6422961950302124},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5936301946640015},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5777450203895569},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.5639001131057739},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36319372057914734},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29323846101760864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15107804536819458},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13448205590248108},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1167653501033783},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08997547626495361}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541424036026001},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.6701684594154358},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6643427610397339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6422961950302124},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5936301946640015},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5777450203895569},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.5639001131057739},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36319372057914734},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29323846101760864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15107804536819458},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13448205590248108},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1167653501033783},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08997547626495361},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01107-y","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-025-01107-y","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1968105776","https://openalex.org/W2095146280","https://openalex.org/W2765421913","https://openalex.org/W2897219387","https://openalex.org/W2974184504","https://openalex.org/W2980801064","https://openalex.org/W3005367885","https://openalex.org/W3011340359","https://openalex.org/W3011501289","https://openalex.org/W3012541778","https://openalex.org/W3037336385","https://openalex.org/W3044380659","https://openalex.org/W3158792679","https://openalex.org/W3159652141","https://openalex.org/W3165242549","https://openalex.org/W4206115082","https://openalex.org/W4225414027","https://openalex.org/W4281293626","https://openalex.org/W4283164430","https://openalex.org/W4288440925","https://openalex.org/W4309737874","https://openalex.org/W4312653858","https://openalex.org/W4312881012","https://openalex.org/W4313361253","https://openalex.org/W4313514235","https://openalex.org/W4318483774","https://openalex.org/W4318485015","https://openalex.org/W4322742975","https://openalex.org/W4324066120","https://openalex.org/W4366090932","https://openalex.org/W4367053371","https://openalex.org/W4376126847","https://openalex.org/W4380785273","https://openalex.org/W4381104237","https://openalex.org/W4385380564","https://openalex.org/W4387734759","https://openalex.org/W4388939622","https://openalex.org/W4391791326","https://openalex.org/W4391791457","https://openalex.org/W4391824073","https://openalex.org/W4393253184","https://openalex.org/W4399125957","https://openalex.org/W4399605629","https://openalex.org/W4399666151","https://openalex.org/W4399767727","https://openalex.org/W4400355391","https://openalex.org/W4401506649","https://openalex.org/W4403563850","https://openalex.org/W4404845670","https://openalex.org/W4405613477","https://openalex.org/W4406028336","https://openalex.org/W4406038964","https://openalex.org/W4406089855","https://openalex.org/W4407144483","https://openalex.org/W4407638870","https://openalex.org/W4407749144","https://openalex.org/W4407948913","https://openalex.org/W4407984793"],"related_works":["https://openalex.org/W2340192855","https://openalex.org/W2741062270","https://openalex.org/W2326507185","https://openalex.org/W2165491783","https://openalex.org/W2783409857","https://openalex.org/W3107051568","https://openalex.org/W2318209665","https://openalex.org/W2507200473","https://openalex.org/W2045035728","https://openalex.org/W2135269905"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
