{"id":"https://openalex.org/W3177450152","doi":"https://doi.org/10.1109/saci51354.2021.9465614","title":"Fuzzy Model for Common Vulnerability Scoring System","display_name":"Fuzzy Model for Common Vulnerability Scoring System","publication_year":2021,"publication_date":"2021-05-19","ids":{"openalex":"https://openalex.org/W3177450152","doi":"https://doi.org/10.1109/saci51354.2021.9465614","mag":"3177450152"},"language":"en","primary_location":{"id":"doi:10.1109/saci51354.2021.9465614","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saci51354.2021.9465614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021890284","display_name":"Mera Nizam-Edden Saulaiman","orcid":"https://orcid.org/0000-0001-9265-2273"},"institutions":[{"id":"https://openalex.org/I103356709","display_name":"Obuda University","ror":"https://ror.org/00ax71d21","country_code":"HU","type":"education","lineage":["https://openalex.org/I103356709"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Mera Saulaiman","raw_affiliation_strings":["BioTech Research Center, EKIK, \u00d3buda University, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"BioTech Research Center, EKIK, \u00d3buda University, Budapest, Hungary","institution_ids":["https://openalex.org/I103356709"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021131513","display_name":"M\u00e1rta Tak\u00e1cs","orcid":"https://orcid.org/0009-0007-8087-3432"},"institutions":[{"id":"https://openalex.org/I103356709","display_name":"Obuda University","ror":"https://ror.org/00ax71d21","country_code":"HU","type":"education","lineage":["https://openalex.org/I103356709"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Marta Takacs","raw_affiliation_strings":["John von Neumann Faculty of informatics, \u00d3buda University, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"John von Neumann Faculty of informatics, \u00d3buda University, Budapest, Hungary","institution_ids":["https://openalex.org/I103356709"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010987810","display_name":"Mikl\u00f3s Kozlovszky","orcid":"https://orcid.org/0000-0001-8096-9628"},"institutions":[{"id":"https://openalex.org/I103356709","display_name":"Obuda University","ror":"https://ror.org/00ax71d21","country_code":"HU","type":"education","lineage":["https://openalex.org/I103356709"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Miklos Kozlovszky","raw_affiliation_strings":["BioTech Research Center, EKIK, \u00d3buda University, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"BioTech Research Center, EKIK, \u00d3buda University, Budapest, Hungary","institution_ids":["https://openalex.org/I103356709"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105470107","display_name":"\u00c1. Csilling","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akos Csilling","raw_affiliation_strings":["Engineering Center Budapest, Robert Bosch Kft, Budapest, Hungary"],"affiliations":[{"raw_affiliation_string":"Engineering Center Budapest, Robert Bosch Kft, Budapest, Hungary","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021890284"],"corresponding_institution_ids":["https://openalex.org/I103356709"],"apc_list":null,"apc_paid":null,"fwci":1.2067,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78897079,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"419","last_page":"424"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/calculator","display_name":"Calculator","score":0.7815470695495605},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.7346149682998657},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7269697785377502},{"id":"https://openalex.org/keywords/toolbox","display_name":"Toolbox","score":0.5861249566078186},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5477626919746399},{"id":"https://openalex.org/keywords/fuzzy-electronics","display_name":"Fuzzy electronics","score":0.5096621513366699},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4919416606426239},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.46655911207199097},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.464044988155365},{"id":"https://openalex.org/keywords/matlab","display_name":"MATLAB","score":0.45218414068222046},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43193119764328003},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.4121449291706085},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4014066159725189},{"id":"https://openalex.org/keywords/fuzzy-number","display_name":"Fuzzy number","score":0.27064791321754456},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2078358232975006},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07678109407424927}],"concepts":[{"id":"https://openalex.org/C2776836400","wikidata":"https://www.wikidata.org/wiki/Q31087","display_name":"Calculator","level":2,"score":0.7815470695495605},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.7346149682998657},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7269697785377502},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.5861249566078186},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5477626919746399},{"id":"https://openalex.org/C102805184","wikidata":"https://www.wikidata.org/wiki/Q5511117","display_name":"Fuzzy electronics","level":5,"score":0.5096621513366699},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4919416606426239},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.46655911207199097},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.464044988155365},{"id":"https://openalex.org/C2780365114","wikidata":"https://www.wikidata.org/wiki/Q169478","display_name":"MATLAB","level":2,"score":0.45218414068222046},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43193119764328003},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4121449291706085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4014066159725189},{"id":"https://openalex.org/C1883856","wikidata":"https://www.wikidata.org/wiki/Q3407463","display_name":"Fuzzy number","level":4,"score":0.27064791321754456},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2078358232975006},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07678109407424927},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saci51354.2021.9465614","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saci51354.2021.9465614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W647955820","https://openalex.org/W1985324839","https://openalex.org/W1992176519","https://openalex.org/W2400222102","https://openalex.org/W2562527291","https://openalex.org/W2740289797","https://openalex.org/W2757156430","https://openalex.org/W2912565176","https://openalex.org/W3033722448","https://openalex.org/W3035735852","https://openalex.org/W3038592394","https://openalex.org/W4211007335","https://openalex.org/W4249749961","https://openalex.org/W6621291386"],"related_works":["https://openalex.org/W1490606327","https://openalex.org/W2475866497","https://openalex.org/W2561023381","https://openalex.org/W2797548350","https://openalex.org/W2362078318","https://openalex.org/W220219137","https://openalex.org/W4205140848","https://openalex.org/W4231071852","https://openalex.org/W2068663075","https://openalex.org/W2389587734"],"abstract_inverted_index":{"The":[0,65,81],"Common":[1],"Vulnerability":[2],"Scoring":[3],"System":[4],"(CVSS)":[5],"is":[6,52,67,92],"a":[7,33,77],"widely":[8],"used":[9],"open":[10],"standard":[11],"for":[12,76],"measuring":[13],"the":[14,37,42,55,71,97,105,109],"severity":[15],"of":[16,32,44,73,83,96],"software":[17],"vulnerabilities":[18],"based":[19],"on":[20],"defined":[21],"metric":[22],"values.":[23],"It":[24],"uses":[25],"optimized":[26,86],"equations":[27],"to":[28,35,107],"combine":[29],"several":[30],"aspects":[31],"vulnerability":[34],"derive":[36],"score.":[38],"In":[39],"this":[40,46],"paper":[41],"possibility":[43,82,98,106],"implementing":[45,84],"CVSS":[47,87],"calculator":[48,88,110],"in":[49,62,100],"fuzzy":[50],"logic":[51,91,102],"discussed,":[53],"using":[54,89],"Fuzzy":[56,90,101],"Logic":[57],"toolbox":[58],"from":[59],"MATLAB":[60],"extended":[61],"Simulink":[63],"environment.":[64],"model":[66],"evaluated":[68],"by":[69],"comparing":[70],"results":[72],"both":[74],"systems":[75],"few":[78],"test":[79],"cases.":[80],"an":[85],"discussed.":[93],"Taking":[94],"advantage":[95],"available":[99],"we":[103],"discuss":[104],"extend":[108],"with":[111],"domain-specific":[112],"metrics.":[113]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
