{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T18:45:56Z","timestamp":1770576356896,"version":"3.49.0"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319086231","type":"print"},{"value":"9783319086248","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-08624-8_7","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:40:10Z","timestamp":1409751610000},"page":"151-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures"],"prefix":"10.1007","author":[{"given":"Robin","family":"Wikstr\u00f6m","sequence":"first","affiliation":[]},{"given":"J\u00f3zsef","family":"Mezei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"issue":"1","key":"7_CR1","first-page":"171","volume":"1","author":"G Acampora","year":"2005","unstructured":"Acampora, G., Loia, V.: Using FML and fuzzy technology in adaptive ambient intelligence environments. Int. J. Comput. Intell. Res. 1(1), 171\u2013182 (2005)","journal-title":"Int. J. Comput. Intell. Res."},{"key":"7_CR2","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report James P. Anderson Company, Fort Washington, Pennsylvania (1980)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Apel, M., Bockermann, C., Meier M.: Measuring similarity of malware behavior. In: IEEE 34th Conference on Local Computer Networks (LCN 2009), pp. 891\u2013898 (2009)","DOI":"10.1109\/LCN.2009.5355037"},{"key":"7_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1870-3","volume-title":"Intuitionistic Fuzzy Sets: Theory and Applications","author":"K Atannasov","year":"1999","unstructured":"Atannasov, K.: Intuitionistic Fuzzy Sets: Theory and Applications. Physica-Verlag, New York (1999)"},{"key":"7_CR5","unstructured":"Berners-Lee, T.: Semantic web on XML. http:\/\/www.w3.org\/2000\/Talks\/1206-xml2k-tbl\/ (2000)"},{"key":"7_CR6","unstructured":"Bobillo, F.: Managing vagueness in ontologies. PhD Thesis, University of Granada, Spain (2008)"},{"issue":"7","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.ijar.2011.05.003","volume":"52","author":"F Bobillo","year":"2011","unstructured":"Bobillo, F., Straccia, U.: Fuzzy ontology representation using OWL 2. Int. J. Approximate Reasoning 52(7), 1073\u20131094 (2011)","journal-title":"Int. J. Approximate Reasoning"},{"issue":"9","key":"7_CR8","doi-asserted-by":"publisher","first-page":"3816","DOI":"10.1016\/j.asoc.2013.05.008","volume":"13","author":"F Bobillo","year":"2013","unstructured":"Bobillo, F., Straccia, U.: Aggregation operators for fuzzy ontologies. Appl. Soft Comput. 13(9), 3816\u20133830 (2013)","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"7_CR9","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/S0167-4048(03)00511-X","volume":"22","author":"M Botha","year":"2003","unstructured":"Botha, M., von Solms, R.: Utilising fuzzy logic and trend analysis for effective intrusion detection. Comput. Secur. 22(5), 423\u2013434 (2003)","journal-title":"Comput. Secur."},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/0165-0114(96)84611-2","volume":"78","author":"P Burillo","year":"1996","unstructured":"Burillo, P., Bustince, H.: Entropy on intuitionistic fuzzy sets and on interval-valued fuzzy sets. Fuzzy Sets Syst. 78(3), 305\u2013316 (1996)","journal-title":"Fuzzy Sets Syst."},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/S0888-613X(99)00045-6","volume":"23","author":"H Bustince","year":"2000","unstructured":"Bustince, H.: Indicator of inclusion grade for interval-valued fuzzy sets. application to approximate reasoning based on interval-valued fuzzy sets. Int. J. Approximate Reasoning 23(3), 137\u2013209 (2000)","journal-title":"Int. J. Approximate Reasoning"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Carlsson, C., Full\u00e9r, R., Mezei J.: Project selection with interval-valued fuzzy numbers. In: IEEE 12th International Symposium on Computational Intelligence and Informatics (CINTI), pp. 23\u201326 (2011)","DOI":"10.1109\/CINTI.2011.6108505"},{"issue":"5","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1016\/j.compeleceng.2012.05.013","volume":"38","author":"CA Catania","year":"2012","unstructured":"Catania, C.A., Garino, C.G.: Automatic network intrusion detection: current techniques and open issues. Comput. Electr. Eng. 38(5), 1062\u20131072 (2012)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"7_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"8","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1016\/j.camwa.2007.06.022","volume":"55","author":"S-J Chen","year":"2008","unstructured":"Chen, S.-J., Chen, S.-M.: Fuzzy risk analysis based on measures of similarity between interval-valued fuzzy numbers. Comput. Math. Appl. 55(8), 1670\u20131685 (2008)","journal-title":"Comput. Math. Appl."},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"6309","DOI":"10.1016\/j.eswa.2008.08.017","volume":"36","author":"S-M Chen","year":"2009","unstructured":"Chen, S.-M., Chen, J.-H.: Fuzzy risk analysis based on similarity measures between interval-valued fuzzy numbers and interval-valued fuzzy number arithmetic operators. Expert Syst. Appl. 36(3), 6309\u20136317 (2009)","journal-title":"Expert Syst. Appl."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Chiang, H.-S., Tsaur, W.: Mobile malware behavioral analysis and preventive strategy using ontology. In: IEEE Second International Conference on Social Computing (SocialCom), pp. 1080\u20131085 (2010)","DOI":"10.1109\/SocialCom.2010.160"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Dai, S.-Y., Fyodor, Y., Kuo, S.-Y., Wu, M.-W., Huang Y.: Malware profiler based on innovative behavior-awareness technique. In: IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 314\u2013319 (2011)","DOI":"10.1109\/PRDC.2011.53"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0167-8655(01)00110-6","volume":"23","author":"L Dengfeng","year":"2002","unstructured":"Dengfeng, L., Chuntian, C.: New similarity measures of intuitionistic fuzzy sets and application to pattern recognitions. Pattern Recogn. Lett. 23(1), 221\u2013225 (2002)","journal-title":"Pattern Recogn. Lett."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy intrusion detection. In: IEEE 9th joint IFSA World Congress and 20th NAFIPS International Conference, vol. 3, pp. 1506\u20131510 (2001)","DOI":"10.1109\/NAFIPS.2001.943772"},{"key":"7_CR21","first-page":"255","volume":"36","author":"Z-Q Feng","year":"2012","unstructured":"Feng, Z.-Q., Liua, C.-G.: On similarity-based approximate reasoning in interval-valued fuzzy environments. Informatics 36, 255\u2013262 (2012)","journal-title":"Informatics"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0165-0114(87)90148-5","volume":"21","author":"M Gorza\u0142czany","year":"1987","unstructured":"Gorza\u0142czany, M.: A method of inference in approximate reasoning based on interval-valued fuzzy sets. Fuzzy Sets Syst. 21(1), 1\u201317 (1987)","journal-title":"Fuzzy Sets Syst."},{"issue":"2","key":"7_CR23","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.fss.2003.08.005","volume":"148","author":"P Grzegorzewski","year":"2004","unstructured":"Grzegorzewski, P.: Distances between intuitionistic fuzzy sets and\/or interval-valued fuzzy sets based on the hausdorff metric. Fuzzy Sets Syst. 148(2), 319\u2013328 (2004)","journal-title":"Fuzzy Sets Syst."},{"issue":"2","key":"7_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/5254.920597","volume":"16","author":"J Hendler","year":"2001","unstructured":"Hendler, J.: Agents and the semantic web. Intell. Syst. 16(2), 30\u201337 (2001)","journal-title":"Intell. Syst."},{"key":"7_CR25","unstructured":"Horridge, M., Kr\u00f6tzsch, M., Parsia, B., Patel-Schneider, P., Rudolph, S.: OWL 2 web ontology language, primer. W3C Working Group (2009)"},{"issue":"2","key":"7_CR26","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.jsis.2012.10.004","volume":"22","author":"J Hua","year":"2013","unstructured":"Hua, J., Bapna, S.: The economic impact of cyber terrorism. J. Strateg. Inf. Syst. 22(2), 175\u2013186 (2013)","journal-title":"J. Strateg. Inf. Syst."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Huang, H.-D., Acampora, G., Loia, V., Lee,C.-S., Hagras, H., Wang, M.-H., Kao, H.-Y., Chang J.-G.: Fuzzy markup language for malware behavioral analysis. In: On the Power of Fuzzy Markup Language, pp. 113\u2013132. Springer (2013)","DOI":"10.1007\/978-3-642-35488-5_7"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Huang, H.-D., Acampora, G., Loia, V., Lee, C.-S., Kao, H.-Y.: Applying FML and fuzzy ontologies to malware behavioural analysis. In: IEEE International Conference on Fuzzy Systems, pp. 2018\u20132025 (2011)","DOI":"10.1109\/FUZZY.2011.6007716"},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s00500-013-1056-0","volume":"18","author":"H-D Huang","year":"2014","unstructured":"Huang, H.-D., Lee, C.-S., Wang, M.-H., Kao, H.-Y.: IT2FS-based ontology with soft-computing mechanism for malware behavior analysis. Soft Comput. 18(2), 267\u2013284 (2014)","journal-title":"Soft Comput."},{"issue":"1\u20132","key":"7_CR30","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.csi.2007.07.008","volume":"30","author":"S-S Hung","year":"2008","unstructured":"Hung, S.-S., Liu, D.S.-M.: A user-oriented ontology-based approach for network intrusion detection. Comput. Stan. Interfaces 30(1\u20132), 78\u201388 (2008)","journal-title":"Comput. Stan. Interfaces"},{"key":"7_CR31","unstructured":"Hwang, C.-M., Yang, M.-S.: New similarity measures between interval-valued fuzzy sets. In: Proceedings of the 15th WSEAS International Conference on Systems, pp. 66\u201370 (2011)"},{"key":"7_CR32","first-page":"229","volume":"2004","author":"H Knublauch","year":"2004","unstructured":"Knublauch, H., Fergerson, R., Noy, N., Musen, M.: The Prot\u00e9g\u00e9 OWL plugin: an open development environment for semantic web applications. The Semantic Web-ISWC 2004, 229\u2013243 (2004)","journal-title":"The Semantic Web-ISWC"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Lau, A., Tsui, E., Lee, W.: An ontology-based similarity measurement for problem-based case reasoning. Expert Syst. Appl. 36(3, Part 2):6574\u20136579 (2009)","DOI":"10.1016\/j.eswa.2008.07.033"},{"issue":"1\u20132","key":"7_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2003.10.001","volume":"155","author":"J Lawry","year":"2004","unstructured":"Lawry, J.: A framework for linguistic modelling. Artif. Intell. 155(1\u20132), 1\u201339 (2004)","journal-title":"Artif. Intell."},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Leder, F.S., Martini, P.: Ngbpa next generation botnet protocol analysis. In: Emerging Challenges for Security, Privacy and Trust, pp. 307\u2013317. Springer (2009)","DOI":"10.1007\/978-3-642-01244-0_27"},{"issue":"2","key":"7_CR36","first-page":"374","volume":"18","author":"C Lee","year":"2010","unstructured":"Lee, C., Wang, M., Hagras, H.: A type-2 fuzzy ontology and its application to personal diabetic-diet recommendation. IEEE Trans. Fuzzy Syst. 18(2), 374\u2013395 (2010)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"10","key":"7_CR37","doi-asserted-by":"publisher","first-page":"7138","DOI":"10.1016\/j.eswa.2010.03.068","volume":"37","author":"W Li","year":"2010","unstructured":"Li, W., Tian, S.: An ontology-based intrusion alerts correlation system. Expert Syst. Appl. 37(10), 7138\u20137146 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"7_CR38","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.patrec.2006.07.009","volume":"28","author":"Y Li","year":"2007","unstructured":"Li, Y., Olson, D.L., Qin, Z.: Similarity measures between intuitionistic fuzzy (vague) sets: a comparative analysis. Pattern Recogn. Lett. 28(2), 278\u2013285 (2007)","journal-title":"Pattern Recogn. Lett."},{"issue":"15","key":"7_CR39","doi-asserted-by":"publisher","first-page":"2687","DOI":"10.1016\/S0167-8655(03)00111-9","volume":"24","author":"Z Liang","year":"2003","unstructured":"Liang, Z., Shi, P.: Similarity measures on intuitionistic fuzzy sets. Pattern Recogn. Lett. 24(15), 2687\u20132693 (2003)","journal-title":"Pattern Recogn. Lett."},{"key":"7_CR40","unstructured":"Liao, Y., Vemuri, V.R.: Using text categorization techniques for intrusion detection. In: USENIX Security Symposium, vol. 12 (2002)"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Liu, W.: Research of data mining in intrusion detection system and the uncertainty of the attack. In: International Symposium on Computer Network and Multimedia Technology, pp. 1\u20134 (2009)","DOI":"10.1109\/CNMT.2009.5374658"},{"issue":"4","key":"7_CR42","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.websem.2008.04.001","volume":"6","author":"T Lukasiewicz","year":"2008","unstructured":"Lukasiewicz, T., Straccia, U.: Managing uncertainty and vagueness in description logics for the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 6(4), 291\u2013308 (2008)","journal-title":"Web Semantics: Science, Services and Agents on the World Wide Web"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"McCulloch, J., Wagner, C., Aickelin, U.: Extending similarity measures of interval type-2 fuzzy sets to general type-2 fuzzy sets. In: IEEE International Conference on Fuzzy Systems, pp. 1\u20138 (2013)","DOI":"10.2139\/ssrn.2828448"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Mezei J., Wikstr\u00f6m, R.: OWAD operators in type-2 fuzzy ontologies. In: Proceedings of the 2013 Joint IFSA World Congress NAFIPS Annual Meeting, number ISBN: 978-1-4799-0347-4, pp. 848-853 (2013)","DOI":"10.1109\/IFSA-NAFIPS.2013.6608511"},{"issue":"16","key":"7_CR45","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1016\/S0167-8655(03)00169-7","volume":"24","author":"H Mitchell","year":"2003","unstructured":"Mitchell, H.: On the dengfeng-chuntian similarity measure and its application to pattern recognition. Pattern Recogn. Lett. 24(16), 3101\u20133104 (2003)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"7_CR46","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ins.2004.02.027","volume":"170","author":"HB Mitchell","year":"2005","unstructured":"Mitchell, H.B.: Pattern recognition using type-II fuzzy sets. Inf. Sci. 170(2), 409\u2013418 (2005)","journal-title":"Inf. Sci."},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Ning, P., Xu, D.: Learning attack strategies from intrusion alerts. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 200\u2013209. ACM, (2003)","DOI":"10.1145\/948109.948137"},{"issue":"11\u201312","key":"7_CR48","first-page":"18","volume":"58","author":"WH Park","year":"2012","unstructured":"Park, W.H.: Risk analysis and damage assessment of financial institutions in cyber attacks between nations. Math. Comput. Model. 58(11\u201312), 18\u201345 (2012)","journal-title":"Math. Comput. Model."},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Riccardi, M., Oro, D., Luna, J., Cremonini, M., Vilanova, M.: A framework for financial botnet analysis. In: eCrime Researchers Summit (eCrime), pp. 1\u20137 (2010)","DOI":"10.1109\/ecrime.2010.5706697"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Riccardi, M., Pietro, R.D., Palanques, M., Vila, J.A.: Titans revenge: detecting Zeus via its own flaws. Comput. Networks 57(2):422\u2013435 (2013) (Botnet Activity: Analysis, Detection and Shutdown.)","DOI":"10.1016\/j.comnet.2012.06.023"},{"issue":"7\u20138","key":"7_CR51","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.cose.2007.10.003","volume":"26","author":"A Sharma","year":"2007","unstructured":"Sharma, A., Pujari, A.K., Paliwal, K.K.: Intrusion detection using text processing techniques with a kernel based similarity measure. Comput. Secur. 26(7\u20138), 488\u2013495 (2007)","journal-title":"Comput. Secur."},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Simmonds, A., Sandilands, P., van Ekert, L.: An ontology for network security attacks. In: Applied Computing, pp. 317\u2013323. Springer (2004)","DOI":"10.1007\/978-3-540-30176-9_41"},{"issue":"4","key":"7_CR53","first-page":"1","volume":"3","author":"E Szmidt","year":"1997","unstructured":"Szmidt, E., Kacprzyk, J.: On measuring distances between intuitionistic fuzzy sets. Notes on IFS 3(4), 1\u201313 (1997)","journal-title":"Notes on IFS"},{"issue":"3","key":"7_CR54","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/S0165-0114(98)00244-9","volume":"114","author":"E Szmidt","year":"2000","unstructured":"Szmidt, E., Kacprzyk, J.: Distances between intuitionistic fuzzy sets. Fuzzy Sets Syst. 114(3), 505\u2013518 (2000)","journal-title":"Fuzzy Sets Syst."},{"issue":"7","key":"7_CR55","first-page":"153","volume":"8","author":"T Tafazzoli","year":"2008","unstructured":"Tafazzoli, T., Sadjadi, S.H.: Malware fuzzy ontology for semantic web. Int. J. Comput. Sci. Network Secur. 8(7), 153\u2013161 (2008)","journal-title":"Int. J. Comput. Sci. Network Secur."},{"issue":"2","key":"7_CR56","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.asoc.2008.06.001","volume":"9","author":"A Tajbakhsh","year":"2009","unstructured":"Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion detection using fuzzy association rules. Appl. Soft Comput. 9(2), 462\u2013469 (2009)","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"7_CR57","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/0165-0114(90)90218-U","volume":"34","author":"I Turksen","year":"1990","unstructured":"Turksen, I., Zhong, Z.: An approximate analogical reasoning schema based on similarity measures and interval-valued fuzzy sets. Fuzzy Sets Syst. 34(3), 323\u2013346 (1990)","journal-title":"Fuzzy Sets Syst."},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Undercoffer, J., Joshi, A., Pinkston, J.: Modeling computer attacks: an ontology for intrusion detection. In: Recent Advances in Intrusion Detection, pp. 113\u2013135. Springer, (2003)","DOI":"10.1007\/978-3-540-45248-5_7"},{"issue":"4","key":"7_CR59","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11416-007-0074-9","volume":"4","author":"G Wagener","year":"2008","unstructured":"Wagener, G., Dulaunoy, A., et al.: Malware behaviour analysis. J. Comput. Virol. 4(4), 279\u2013287 (2008)","journal-title":"J. Comput. Virol."},{"key":"7_CR60","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.ins.2013.05.013","volume":"244","author":"C Wang","year":"2013","unstructured":"Wang, C., Entropy, AQu: similarity measure and distance measure of vague soft sets and their relations. Inf. Sci. 244, 92\u2013106 (2013)","journal-title":"Inf. Sci."},{"issue":"9","key":"7_CR61","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"7_CR62","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1016\/j.ins.2008.12.010","volume":"179","author":"D Wu","year":"2009","unstructured":"Wu, D., Mendel, J.: A comparative study of ranking methods, similarity measures and uncertainty measures for interval type-2 fuzzy sets. Inf. Sci. 179(8), 1169\u20131192 (2009)","journal-title":"Inf. Sci."},{"issue":"2","key":"7_CR63","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ins.2007.04.014","volume":"178","author":"D Wu","year":"2008","unstructured":"Wu, D., Mendel, J.M.: A vector similarity measure for linguistic approximation: interval type-2 and type-1 fuzzy sets. Inf. Sci. 178(2), 381\u2013402 (2008)","journal-title":"Inf. Sci."},{"issue":"2","key":"7_CR64","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10700-007-9004-z","volume":"6","author":"Z Xu","year":"2007","unstructured":"Xu, Z.: Some similarity measures of intuitionistic fuzzy sets and their applications to multiple attribute decision making. Fuzzy Optim. Decis. Making 6(2), 109\u2013121 (2007)","journal-title":"Fuzzy Optim. Decis. Making"},{"issue":"4","key":"7_CR65","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/s11518-008-5084-8","volume":"17","author":"Z Xu","year":"2008","unstructured":"Xu, Z., Chen, J.: Ordered weighted distance measure. J. Syst. Sci. Syst. Eng. 17(4), 432\u2013445 (2008)","journal-title":"J. Syst. Sci. Syst. Eng."},{"issue":"2","key":"7_CR66","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/91.493904","volume":"4","author":"LA Zadeh","year":"1996","unstructured":"Zadeh, L.A.: Fuzzy logic = computing with words. IEEE Trans. Fuzzy Syst. 4(2), 103\u2013111 (1996)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"5","key":"7_CR67","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1016\/j.ins.2007.10.007","volume":"178","author":"W Zeng","year":"2008","unstructured":"Zeng, W., Guo, P.: Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship. Inf. Sci. 178(5), 1334\u20131342 (2008)","journal-title":"Inf. Sci."},{"issue":"11","key":"7_CR68","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1016\/j.fss.2005.11.020","volume":"157","author":"W Zeng","year":"2006","unstructured":"Zeng, W., Li, H.: Relationship between similarity measure and entropy of interval valued fuzzy sets. Fuzzy Sets Syst. 157(11), 1477\u20131484 (2006)","journal-title":"Fuzzy Sets Syst."},{"issue":"12","key":"7_CR69","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1016\/j.patrec.2005.11.020","volume":"27","author":"C Zhang","year":"2006","unstructured":"Zhang, C., Fu, H.: Similarity measures on three kinds of fuzzy sets. Pattern Recogn. Lett. 27(12), 1307\u20131317 (2006)","journal-title":"Pattern Recogn. Lett."},{"key":"7_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhang, W.: Inclusion measure and similarity measure of intuitionistic and interval-valued fuzzy sets. In: Proceedings of the 2007 International Conference on Intelligent Systems and Knowledge Engineering (ISKE2007) (2007)","DOI":"10.2991\/iske.2007.178"},{"key":"7_CR71","doi-asserted-by":"crossref","unstructured":"Zheng, G., Wang, J., Zhou, W., Zhang, Y.: A similarity measure between interval type-2 fuzzy sets. In: International Conference on Mechatronics and Automation (ICMA), pp. 191\u2013195 (2010)","DOI":"10.1109\/ICMA.2010.5589072"},{"key":"7_CR72","doi-asserted-by":"crossref","unstructured":"Zheng, G., Xiao, J., Wang, J., Wei, Z.: A similarity measure between general type-2 fuzzy sets and its application in clustering. In: IEEE 8th World Congress on Intelligent Control and Automation (WCICA), pp. 6383\u20136387 (2010)","DOI":"10.1109\/WCICA.2010.5554327"}],"container-title":["Studies in Computational Intelligence","Intelligent Methods for Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08624-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:01:04Z","timestamp":1746363664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08624-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"ISBN":["9783319086231","9783319086248"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08624-8_7","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,4]]},"assertion":[{"value":"4 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}