{"id":"https://openalex.org/W4412188555","doi":"https://doi.org/10.32604/cmc.2025.065011","title":"Classification of Cyber Threat Detection Techniques for Next-Generation Cyber Defense via Hesitant Bipolar Fuzzy Frank Information","display_name":"Classification of Cyber Threat Detection Techniques for Next-Generation Cyber Defense via Hesitant Bipolar Fuzzy Frank Information","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412188555","doi":"https://doi.org/10.32604/cmc.2025.065011"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065011","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065011","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065011","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101532469","display_name":"Hafiz Muhammad Waqas","orcid":"https://orcid.org/0009-0007-3419-7402"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hafiz Muhammad Waqas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026844929","display_name":"Tahir Mahmood","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tahir Mahmood","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008568138","display_name":"Walid Emam","orcid":"https://orcid.org/0000-0002-6810-6640"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Walid Emam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007632241","display_name":"Ubaid ur Rehman","orcid":"https://orcid.org/0000-0002-5361-6592"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ubaid ur Rehman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5018974025","display_name":"Dragan Pamu\u010dar","orcid":"https://orcid.org/0000-0001-8522-1942"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dragan Pamucar","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101532469"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28051814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"3","first_page":"4699","last_page":"4727"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8342000246047974,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8342000246047974,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8309999704360962,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.7853999733924866,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.583617091178894},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.49249109625816345},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.49139586091041565},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4662099778652191},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21569597721099854}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.583617091178894},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.49249109625816345},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.49139586091041565},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4662099778652191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21569597721099854}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065011","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065011","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065011","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065011","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2035572150","https://openalex.org/W2043725578","https://openalex.org/W2556338575","https://openalex.org/W2804939729","https://openalex.org/W2883155780","https://openalex.org/W2896010100","https://openalex.org/W2987485128","https://openalex.org/W3158113069","https://openalex.org/W4246632815","https://openalex.org/W4290755474","https://openalex.org/W4308529607","https://openalex.org/W4313398126","https://openalex.org/W4379645967","https://openalex.org/W4382361068","https://openalex.org/W4391776064","https://openalex.org/W4392158429","https://openalex.org/W4401210359","https://openalex.org/W4403799932","https://openalex.org/W4404090886","https://openalex.org/W4406772561","https://openalex.org/W4407184629"],"related_works":["https://openalex.org/W3110311961","https://openalex.org/W4396897946","https://openalex.org/W3040950835","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W4285815382","https://openalex.org/W4385452110","https://openalex.org/W4399917864","https://openalex.org/W2561342496"],"abstract_inverted_index":{"Cyber":[0,70],"threat":[1,71,129],"detection":[2,35,59,72,103,130,151,201],"is":[3,19,139,143,163],"a":[4,140,195],"crucial":[5],"aspect":[6],"of":[7,16,22,47,127,150,184,198],"contemporary":[8],"cybersecurity":[9,161,192],"due":[10],"to":[11,43,63,65,75],"the":[12,20,61,84,125,155,185],"depth":[13],"and":[14,27,32,40,51,57,79,94,112,148,170,203],"complexity":[15],"cyberattacks.":[17],"It":[18],"identification":[21],"malicious":[23],"activity,":[24],"unauthorized":[25],"access,":[26],"possible":[28,86],"intrusions":[29],"in":[30,97,102,109,114,116,174,188,207],"networks":[31],"systems.":[33],"Modern":[34],"methods":[36,131,152],"employ":[37],"artificial":[38],"intelligence":[39],"machine":[41],"learning":[42],"study":[44],"vast":[45],"amounts":[46],"data,":[48],"learn":[49],"patterns,":[50],"anticipate":[52],"potential":[53],"threats.":[54,212],"Real-time":[55],"monitoring":[56],"anomaly":[58],"improve":[60],"capacity":[62],"react":[64],"changing":[66],"threats":[67],"more":[68],"rapidly.":[69],"systems":[73],"aim":[74],"reduce":[76],"false":[77],"positives":[78],"provide":[80],"complete":[81],"coverage":[82],"against":[83,210],"broadest":[85],"attacks.":[87],"This":[88,121],"research":[89,167],"advocates":[90],"for":[91,145,159],"proactive":[92],"measures":[93,202],"adaptive":[95],"technologies":[96],"defending":[98],"digital":[99,119],"environments.":[100],"Improvements":[101],"ability":[104],"by":[105,176],"organizations":[106],"will":[107],"assist":[108],"safeguarding":[110],"assets":[111],"integrity":[113],"operations":[115],"this":[117,166],"increasingly":[118],"world.":[120],"paper":[122],"draws":[123],"on":[124],"categorization":[126],"cyber":[128],"using":[132],"hesitant":[133,178],"bipolar":[134,179],"fuzzy":[135,180],"Frank":[136],"operators.":[137],"Categorization":[138],"step":[141],"that":[142,154,172],"necessary":[144],"systematic":[146],"comparison":[147],"assessment":[149],"so":[153],"most":[156],"suitable":[157],"method":[158,197],"particular":[160],"requirements":[162],"chosen.":[164],"Furthermore,":[165],"manages":[168],"uncertainty":[169],"vagueness":[171],"exists":[173],"decision-making":[175],"applying":[177],"logic.":[181],"The":[182],"importance":[183],"work":[186],"lies":[187],"how":[189],"it":[190],"fortifies":[191],"architectures":[193],"with":[194],"formal":[196],"discovering":[199],"optimal":[200],"improving":[204],"responsiveness,":[205],"resulting":[206],"holistic":[208],"protection":[209],"dynamic":[211]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
