A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT.
Aaisha MakkarUttam GhoshPradip Kumar SharmaAmir JavedPublished in: IEEE Internet Things J. (2023)
Keyphrases
- cyber security
- security problems
- cyber defense
- cyber crime
- fuzzy sets
- information security
- cyber attacks
- national security
- security issues
- intrusion detection
- key management
- management system
- security requirements
- membership functions
- cloud computing
- rough sets
- network security
- fuzzy logic
- statistical databases
- cyber physical systems
- fuzzy numbers
- critical infrastructure
- fuzzy rules
- access control
- data mining
- countermeasures
- data security
- security policies
- neural network
- web intelligence
- big data