{"id":"https://openalex.org/W4415546955","doi":"https://doi.org/10.1007/s11227-025-07960-x","title":"Cybersecurity situation assessment based on fuzzy cluster analysis and fuzzy comprehensive judgment decision-making","display_name":"Cybersecurity situation assessment based on fuzzy cluster analysis and fuzzy comprehensive judgment decision-making","publication_year":2025,"publication_date":"2025-10-25","ids":{"openalex":"https://openalex.org/W4415546955","doi":"https://doi.org/10.1007/s11227-025-07960-x"},"language":"en","primary_location":{"id":"doi:10.1007/s11227-025-07960-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11227-025-07960-x","pdf_url":null,"source":{"id":"https://openalex.org/S32326811","display_name":"The Journal of Supercomputing","issn_l":"0920-8542","issn":["0920-8542","1573-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Journal of Supercomputing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041597003","display_name":"Kesheng Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I6645349","display_name":"Southwest Minzu University","ror":"https://ror.org/04gaexw88","country_code":"CN","type":"education","lineage":["https://openalex.org/I6645349"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kesheng Liu","raw_affiliation_strings":["School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China","institution_ids":["https://openalex.org/I6645349"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082955232","display_name":"Binyong Li","orcid":"https://orcid.org/0000-0003-3615-1129"},"institutions":[{"id":"https://openalex.org/I6645349","display_name":"Southwest Minzu University","ror":"https://ror.org/04gaexw88","country_code":"CN","type":"education","lineage":["https://openalex.org/I6645349"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I204831749","display_name":"Southwestern University of Finance and Economics","ror":"https://ror.org/04ewct822","country_code":"CN","type":"education","lineage":["https://openalex.org/I204831749"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binyong Li","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China","SUGON Industrial Control and Security Center, Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China","School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"SUGON Industrial Control and Security Center, Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China","institution_ids":["https://openalex.org/I204831749"]},{"raw_affiliation_string":"School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, 24 Xuefu Road Section 1, Southwest Airport Economic Development Zone, Chengdu, 610225, Sichuan, China","institution_ids":["https://openalex.org/I6645349"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041597003"],"corresponding_institution_ids":["https://openalex.org/I6645349"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37726916,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"81","issue":"16","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.6079000234603882},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6039000153541565},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.53329998254776},{"id":"https://openalex.org/keywords/fuzzy-clustering","display_name":"Fuzzy clustering","score":0.5274999737739563},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4498000144958496},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.4431000053882599},{"id":"https://openalex.org/keywords/situation-analysis","display_name":"Situation analysis","score":0.41920000314712524},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.38269999623298645},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.3684999942779541}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8274000287055969},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.6079000234603882},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6039000153541565},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5817000269889832},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.53329998254776},{"id":"https://openalex.org/C17212007","wikidata":"https://www.wikidata.org/wiki/Q5511111","display_name":"Fuzzy clustering","level":3,"score":0.5274999737739563},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4498000144958496},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4431000053882599},{"id":"https://openalex.org/C14911803","wikidata":"https://www.wikidata.org/wiki/Q7532148","display_name":"Situation analysis","level":2,"score":0.41920000314712524},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.38269999623298645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37459999322891235},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.3684999942779541},{"id":"https://openalex.org/C191399111","wikidata":"https://www.wikidata.org/wiki/Q64861","display_name":"Transitive relation","level":2,"score":0.36649999022483826},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35679998993873596},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.35179999470710754},{"id":"https://openalex.org/C148671577","wikidata":"https://www.wikidata.org/wiki/Q5511133","display_name":"Fuzzy set operations","level":4,"score":0.3249000012874603},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C127385683","wikidata":"https://www.wikidata.org/wiki/Q1475696","display_name":"Fuzzy classification","level":4,"score":0.2919999957084656},{"id":"https://openalex.org/C1883856","wikidata":"https://www.wikidata.org/wiki/Q3407463","display_name":"Fuzzy number","level":4,"score":0.289900004863739},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C170260401","wikidata":"https://www.wikidata.org/wiki/Q5251735","display_name":"Defuzzification","level":5,"score":0.26190000772476196},{"id":"https://openalex.org/C29470771","wikidata":"https://www.wikidata.org/wiki/Q4165150","display_name":"Neuro-fuzzy","level":4,"score":0.25949999690055847},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2549999952316284},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11227-025-07960-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11227-025-07960-x","pdf_url":null,"source":{"id":"https://openalex.org/S32326811","display_name":"The Journal of Supercomputing","issn_l":"0920-8542","issn":["0920-8542","1573-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Journal of Supercomputing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W3004099454","https://openalex.org/W3011524935","https://openalex.org/W3092637398","https://openalex.org/W3118181167","https://openalex.org/W3134330352","https://openalex.org/W3179235264","https://openalex.org/W3208100491","https://openalex.org/W4200616942","https://openalex.org/W4210709063","https://openalex.org/W4226099585","https://openalex.org/W4283207755","https://openalex.org/W4286009580","https://openalex.org/W4290927796","https://openalex.org/W4312829973","https://openalex.org/W4319302829","https://openalex.org/W4385210255","https://openalex.org/W4386295630","https://openalex.org/W4389262106","https://openalex.org/W6885053694","https://openalex.org/W7104100800"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-25T00:00:00"}
