Security and Communication Networks

Security Algorithms and Risk Management using Fuzzy Sets


Publishing date
01 Dec 2021
Status
Published
Submission deadline
06 Aug 2021

Lead Editor

1Riphah International University, Lahore, Pakistan

2International Islamic University, Islamabad, Pakistan

3The University of Haripur, Haripur, Pakistan

4Ningbo University, Ningbo, China


Security Algorithms and Risk Management using Fuzzy Sets

Description

A fuzzy set is a tool that deals with reasoning. Unlike conventional logic, fuzzy sets enhance the capability of human decision-making by modelling the uncertainties present in our daily life issues. Fuzzy logic takes several possibilities as input. In return, it gives a definite output.

Fuzzy sets can be implemented in large networks, microcontrollers, workstation-based systems. It can even be initiated by combining software and hardware. Thus far, a handful number of algorithms are developed based on fuzzy notions. These fuzzy notions help us solve artificial intelligence and machine learning problems (e.g. decision-making algorithms, clustering algorithms, algorithms for pattern recognition based on information measures, classification algorithms, deep learning algorithms, fuzzy relation-based algorithms, fuzzy rule-based algorithms, algorithms to investigate communication networks and algorithms for knowledge-based systems). In recent years, the notion of a fuzzy set has been further developed by generalizing the concept of membership function. Several flexible extensions of fuzzy sets include the framework of Atanassov’s intuitionistic fuzzy sets, Pythagorean fuzzy sets, generalized orthopair fuzzy sets, picture fuzzy sets, spherical and T-spherical fuzzy sets and neutrosophic sets. All these fuzzy frameworks are extensively used in many practical situations under uncertainties.

The aim of this Special Issue is to bring together original research review articles discussing security and communication problems based on machine learning and artificial intelligence algorithms in fuzzy environments.

Potential topics include but are not limited to the following:

  • Deep learning techniques involving fuzziness in security algorithms
  • Decision-making algorithms for security based on extended fuzzy frameworks
  • Information measure-based algorithms for security problems under uncertainties
  • Knowledge-based systems for communication networks
  • Security of networks based on fuzzy rules
  • Fuzzy pattern recognition for security assessment
  • Knowledge management and information retrieval algorithms involving fuzziness
  • Fuzzy graph algorithms to investigate communication networks
  • Algorithms for transportation systems under uncertainty
  • Classification algorithms involving fuzziness
  • Clustering algorithms based on extended fuzzy frameworks

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 9895347
  • - Retraction

Retracted: Hybrid Structures Applied to Subalgebras of BCH-Algebras

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9812046
  • - Retraction

Retracted: A Systematic Analysis of Regression Test Case Selection: A Multi-Criteria-Based Approach

Security and Communication Networks
  • Special Issue
  • - Volume 2022
  • - Article ID 6254055
  • - Research Article

[Retracted] Intuitionistic Fuzzy Double Controlled Metric Spaces and Related Results

Misbah Farheen | Khalil Ahmed | ... | Umar Ishtiaq
  • Special Issue
  • - Volume 2022
  • - Article ID 1651017
  • - Research Article

[Retracted] Hamacher Weighted Aggregation Operators Based on Picture Cubic Fuzzy Sets and Their Application to Group Decision-Making Problems

Li Yanhong | Rabia Ambrin | ... | Muhammad Ali Khan
  • Special Issue
  • - Volume 2022
  • - Article ID 7752292
  • - Research Article

[Retracted] Face Security Authentication System Based on Deep Learning and Homomorphic Encryption

Dechao Sun | Hong Huang | ... | Renfang Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 9939546
  • - Research Article

[Retracted] Fixed Point of Rational Contractions and Its Application for Secure Dynamic Routing in Wireless Sensor Networks

Awais Asif | Ekrem Savas | ... | Abdul Rehman
  • Special Issue
  • - Volume 2021
  • - Article ID 5834807
  • - Research Article

[Retracted] A Systematic Analysis of Regression Test Case Selection: A Multi-Criteria-Based Approach

Muhammad Rehan | Norhalina Senan | ... | Hizbullah Khatak
  • Special Issue
  • - Volume 2021
  • - Article ID 3774353
  • - Research Article

[Retracted] Some Novel Geometric Aggregation Operators of Spherical Cubic Fuzzy Information with Application

Zafar Ullah | Huma Bashir | ... | Abdul Ghaffar
  • Special Issue
  • - Volume 2021
  • - Article ID 5155524
  • - Research Article

[Retracted] Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model

Zhiqi Fang | Qifeng Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 4229013
  • - Research Article

[Retracted] An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor

Yani Zheng | Gaurav Dhiman | ... | Mohd Asif Shah
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.