Security and Communication Networks

Security Algorithms and Risk Management using Fuzzy Sets


Publishing date
01 Dec 2021
Status
Published
Submission deadline
06 Aug 2021

Lead Editor

1Riphah International University, Lahore, Pakistan

2International Islamic University, Islamabad, Pakistan

3The University of Haripur, Haripur, Pakistan

4Ningbo University, Ningbo, China


Security Algorithms and Risk Management using Fuzzy Sets

Description

A fuzzy set is a tool that deals with reasoning. Unlike conventional logic, fuzzy sets enhance the capability of human decision-making by modelling the uncertainties present in our daily life issues. Fuzzy logic takes several possibilities as input. In return, it gives a definite output.

Fuzzy sets can be implemented in large networks, microcontrollers, workstation-based systems. It can even be initiated by combining software and hardware. Thus far, a handful number of algorithms are developed based on fuzzy notions. These fuzzy notions help us solve artificial intelligence and machine learning problems (e.g. decision-making algorithms, clustering algorithms, algorithms for pattern recognition based on information measures, classification algorithms, deep learning algorithms, fuzzy relation-based algorithms, fuzzy rule-based algorithms, algorithms to investigate communication networks and algorithms for knowledge-based systems). In recent years, the notion of a fuzzy set has been further developed by generalizing the concept of membership function. Several flexible extensions of fuzzy sets include the framework of Atanassov’s intuitionistic fuzzy sets, Pythagorean fuzzy sets, generalized orthopair fuzzy sets, picture fuzzy sets, spherical and T-spherical fuzzy sets and neutrosophic sets. All these fuzzy frameworks are extensively used in many practical situations under uncertainties.

The aim of this Special Issue is to bring together original research review articles discussing security and communication problems based on machine learning and artificial intelligence algorithms in fuzzy environments.

Potential topics include but are not limited to the following:

  • Deep learning techniques involving fuzziness in security algorithms
  • Decision-making algorithms for security based on extended fuzzy frameworks
  • Information measure-based algorithms for security problems under uncertainties
  • Knowledge-based systems for communication networks
  • Security of networks based on fuzzy rules
  • Fuzzy pattern recognition for security assessment
  • Knowledge management and information retrieval algorithms involving fuzziness
  • Fuzzy graph algorithms to investigate communication networks
  • Algorithms for transportation systems under uncertainty
  • Classification algorithms involving fuzziness
  • Clustering algorithms based on extended fuzzy frameworks

Articles

  • Special Issue
  • - Volume 2024
  • - Article ID 9794857
  • - Retraction

Retracted: More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras

Security and Communication Networks
  • Special Issue
  • - Volume 2024
  • - Article ID 9848653
  • - Retraction

Retracted: An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor

Security and Communication Networks
  • Special Issue
  • - Volume 2024
  • - Article ID 9892673
  • - Retraction

Retracted: Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9830648
  • - Retraction

Retracted: Hamacher Weighted Aggregation Operators Based on Picture Cubic Fuzzy Sets and Their Application to Group Decision-Making Problems

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9870590
  • - Retraction

Retracted: Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9859610
  • - Retraction

Retracted: Face Security Authentication System Based on Deep Learning and Homomorphic Encryption

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9836094
  • - Retraction

Retracted: The Segmentation of Road Scenes Based on Improved ESPNet Model

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9875680
  • - Retraction

Retracted: Fixed Point of Rational Contractions and Its Application for Secure Dynamic Routing in Wireless Sensor Networks

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9852468
  • - Retraction

Retracted: Some Novel Geometric Aggregation Operators of Spherical Cubic Fuzzy Information with Application

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9791560
  • - Retraction

Retracted: Intuitionistic Fuzzy Double Controlled Metric Spaces and Related Results

Security and Communication Networks
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.