{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:01:29Z","timestamp":1760709689412},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T00:00:00Z","timestamp":1535155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s00500-018-3474-5","type":"journal-article","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T03:06:56Z","timestamp":1535166416000},"page":"8741-8752","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Strict intuitionistic fuzzy entropy and application in network vulnerability evaluation"],"prefix":"10.1007","volume":"23","author":[{"given":"Xiaoshi","family":"Fan","sequence":"first","affiliation":[]},{"given":"Chenghai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,25]]},"reference":[{"key":"3474_CR1","unstructured":"Apache Web Server chunk vulnerability (2002). \n                    http:\/\/httpd.apache.org\/info\/security_bulletin_20020617.txt"},{"issue":"1","key":"3474_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","volume":"20","author":"K Atanassov","year":"1986","unstructured":"Atanassov K (1986) Intuitionistic fuzzy sets. Fuzzy Sets Syst 20(1):87\u201396","journal-title":"Fuzzy Sets Syst"},{"key":"3474_CR3","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/0165-0114(96)84611-2","volume":"78","author":"P Burillo","year":"1996","unstructured":"Burillo P, Bustince H (1996) Entropy on intuitionistic fuzzy sets and interval valued fuzzy sets. Fuzzy Sets Syst 78:305\u2013316","journal-title":"Fuzzy Sets Syst"},{"issue":"3","key":"3474_CR4","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/0165-0114(95)00154-9","volume":"79","author":"H Bustince","year":"1996","unstructured":"Bustince H, Burillo P (1996) Vague sets are intuitionistic fuzzy sets. Fuzzy Sets Syst 79(3):403\u2013405","journal-title":"Fuzzy Sets Syst"},{"issue":"4","key":"3474_CR5","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1016\/j.asoc.2011.12.011","volume":"12","author":"T Chaira","year":"2012","unstructured":"Chaira T (2012) Arank ordered filter for medical image edge enhancement and detection using intuitionistic fuzzy set. Appl Soft Comput J 12(4):1259\u20131266","journal-title":"Appl Soft Comput J"},{"issue":"2","key":"3474_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.eij.2014.03.002","volume":"15","author":"J Deepa","year":"2014","unstructured":"Deepa J, Sanjay K (2014) Intuitionistic fuzzy entropy and distance measure based TOPSIS method for multi-criteria decision making. Egypt Inform J 15(2):97\u2013104","journal-title":"Egypt Inform J"},{"issue":"2","key":"3474_CR7","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.knosys.2012.10.006","volume":"39","author":"B Farhadinia","year":"2013","unstructured":"Farhadinia B (2013) A theoretical development on the entropy of interval-valued fuzzy sets based on the intuitionistic distance and its relationship with similarity measure. Knowl Based Syst 39(2):79\u201384","journal-title":"Knowl Based Syst"},{"issue":"1","key":"3474_CR8","first-page":"18","volume":"53","author":"H Hannes","year":"2015","unstructured":"Hannes H, Khalida KA (2015) An expert-based investigation of the common vulnerability scoring system. Comput Secur 53(1):18\u201330","journal-title":"Comput Secur"},{"key":"3474_CR9","unstructured":"Houmb SH, Franqueria VN (2009) Estimating ToE level using CVSS. In: Proceeding of the forth international conference on availability, reliability and security. IEEE Computer Society, Fukuoka, Japan, March 16\u201319, pp 718\u2013725"},{"issue":"9","key":"3474_CR10","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1016\/j.jss.2009.08.023","volume":"83","author":"SH Houmb","year":"2010","unstructured":"Houmb SH, Franqueira VNL, Engum EA (2010) Quantifying security risk level from CVSS estimates of frequency and impact. J Syst Softw 83(9):1622\u20131634","journal-title":"J Syst Softw"},{"issue":"12","key":"3474_CR11","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1016\/j.compbiomed.2013.10.016","volume":"43","author":"P Jaganathan","year":"2013","unstructured":"Jaganathan P, Kuppuchamy R (2013) A threshold fuzzy entropy based feature selection for medical database classification. Comput Biol Med 43(12):2222\u20132229","journal-title":"Comput Biol Med"},{"issue":"7","key":"3474_CR12","first-page":"1197","volume":"16","author":"S Khaleie","year":"2012","unstructured":"Khaleie S, Fasanghari M (2012) An intuitionistic fuzzy group decision making method using entropy and association coefficient. SoftComputing 16(7):1197\u20131211","journal-title":"SoftComputing"},{"issue":"15","key":"3474_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.autcon.2013.12.009","volume":"40","author":"M Kucukvar","year":"2014","unstructured":"Kucukvar M, Gumus S, Egilmez G et al (2014) Ranking the sustainability performance of pavements: an intuitionistic fuzzy decision making method. Autom Constr 40(15):33\u201343","journal-title":"Autom Constr"},{"issue":"1","key":"3474_CR14","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2011.11.021","volume":"188","author":"J Li","year":"2012","unstructured":"Li J, Deng G, Li H, Zeng W (2012) The relationship between similarity measure and entropy of intuitionistic fuzzy sets. Inf Sci 188(1):314\u2013321","journal-title":"Inf Sci"},{"key":"3474_CR15","first-page":"1","volume":"99","author":"Z Liu","year":"2017","unstructured":"Liu Z, Pan Q, Dezert J et al (2017) Combination of classifiers with optimal weigh based on evidential reasoning. IEEE Trans Fuzzy Syst 99:1","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"5","key":"3474_CR16","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1109\/TCYB.2017.2710205","volume":"48","author":"Z Liu","year":"2018","unstructured":"Liu Z, Pan Q, Dezert J et al (2018) Classifier fusion with contextual reliability evaluation. IEEE Trans Cybern 48(5):1605\u20131618","journal-title":"IEEE Trans Cybern"},{"issue":"8","key":"3474_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.knosys.2013.04.011","volume":"48","author":"JJ Mao","year":"2013","unstructured":"Mao JJ, Yao DB, Wang CC (2013) A novel cross-entropy and entropy measures of IFSs and their applications. Knowl Based Syst 48(8):37\u201345","journal-title":"Knowl Based Syst"},{"key":"3474_CR18","unstructured":"Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. \n                    http:\/\/www.first.org\/cvss\/cvss-guide.html"},{"issue":"1","key":"3474_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10044-014-0378-6","volume":"19","author":"FY Meng","year":"2016","unstructured":"Meng FY, Chen XH (2016) Entropy and similarity measure of Atanassov\u2019s intuitionistic fuzzy sets and their application to pattern recognition based on fuzzy measures. Pattern Anal Appl 19(1):11\u201320","journal-title":"Pattern Anal Appl"},{"issue":"1","key":"3474_CR20","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-19324-3_20","volume":"9119","author":"Y Nataliani","year":"2015","unstructured":"Nataliani Y, Hwang CM, Yang MS (2015) An exponential-type entropy measure on intuitionistic fuzzy sets. Lect Notes Comput Sci 9119(1):218\u2013227","journal-title":"Lect Notes Comput Sci"},{"key":"3474_CR21","unstructured":"National Vulnerability Database Version 2 (2009). \n                    http:\/\/nvd.nist.gov"},{"issue":"10","key":"3474_CR22","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2012.11.016","volume":"228","author":"NR Pal","year":"2013","unstructured":"Pal NR, Bustice H, Pagola M et al (2013) Uncertainties with Atanassov\u2019s intuitionistic fuzzy sets: fuzziness and lack of knowledge. Inf Sci 228(10):61\u201374","journal-title":"Inf Sci"},{"issue":"1","key":"3474_CR23","first-page":"15","volume":"4","author":"MP Pedro","year":"2013","unstructured":"Pedro MP, Pedro C, Humberto B et al (2013) Image segmentation using Atanassov\u2019s intuitionistic fuzzy sets. Expert Syst Appl 4(1):15\u201326","journal-title":"Expert Syst Appl"},{"issue":"5","key":"3474_CR24","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.procs.2013.05.060","volume":"17","author":"JD Qin","year":"2013","unstructured":"Qin JD, Liu XW (2013) Study on interval intuitionistic fuzzy multi-attribute group decision making method based on Choquet integral. Procedia Comput Sci 17(5):465\u2013472","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"3474_CR25","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/s10489-014-0596-z","volume":"42","author":"YF Song","year":"2015","unstructured":"Song YF, Wang XD, Lei L et al (2015) A novel similarity measure on intuitionistic fuzzy sets with its application. Appl Intell 42(2):252\u2013261","journal-title":"Appl Intell"},{"key":"3474_CR26","first-page":"1","volume":"1","author":"YF Song","year":"2017","unstructured":"Song YF, Wang XD, Quan W, Huang W et al (2017) A new approach to construct similarity measure for intuitionistic fuzzy sets. Soft Comput 1:1\u201314","journal-title":"Soft Comput"},{"issue":"3","key":"3474_CR27","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/S0165-0114(98)00402-3","volume":"118","author":"E Szmidt","year":"2001","unstructured":"Szmidt E, Kacprzyk J (2001) Entropy for intuitionistic fuzzy sets. Fuzzy Sets Syst 118(3):467\u2013477","journal-title":"Fuzzy Sets Syst"},{"issue":"12","key":"3474_CR28","first-page":"1390","volume":"22","author":"Y Wang","year":"2007","unstructured":"Wang Y, Lei YJ (2007) A technique for constructing intuitionistic fuzzy entropy. Control Decis 22(12):1390\u20131394","journal-title":"Control Decis"},{"issue":"19","key":"3474_CR29","doi-asserted-by":"publisher","first-page":"4273","DOI":"10.1016\/j.ins.2011.06.001","volume":"181","author":"CP Wei","year":"2011","unstructured":"Wei CP, Wang P, Zhang YZ (2011) Entropy, similarity measure of interval-valued intuitionistic fuzzy sets and their applications. Inf Sci 181(19):4273\u20134286","journal-title":"Inf Sci"},{"issue":"1\/2","key":"3474_CR30","first-page":"56","volume":"87","author":"J Ye","year":"2010","unstructured":"Ye J (2010) Two effective measures of intuitionistic fuzzy entropy. Computing 87(1\/2):56\u201362","journal-title":"Computing"},{"issue":"3","key":"3474_CR31","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy set. Inf Control 8(3):338\u2013356","journal-title":"Inf Control"},{"issue":"11","key":"3474_CR32","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1016\/j.fss.2005.11.020","volume":"157","author":"WY Zeng","year":"2006","unstructured":"Zeng WY, Li HX (2006) Relationship between similarity measure and entropy of interval-valued fuzzy sets. Fuzzy Sets Syst 157(11):1477\u20131484","journal-title":"Fuzzy Sets Syst"},{"issue":"2","key":"3474_CR33","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.knosys.2015.11.015","volume":"94","author":"WY Zeng","year":"2016","unstructured":"Zeng WY, Zhao YB, Gu YD (2016) Similarity measure for vague sets based on implication functions. Knowl Based Syst 94(2):124\u2013131","journal-title":"Knowl Based Syst"},{"issue":"21","key":"3474_CR34","doi-asserted-by":"publisher","first-page":"4184","DOI":"10.1016\/j.ins.2008.07.003","volume":"178","author":"QS Zhang","year":"2008","unstructured":"Zhang QS, Jiang SY (2008) A note on information entropy measures for vague set and its application. Inf Sci 178(21):4184\u20134191","journal-title":"Inf Sci"},{"issue":"6","key":"3474_CR35","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.knosys.2009.06.007","volume":"22","author":"HY Zhang","year":"2009","unstructured":"Zhang HY, Zhang WX, Mei CL (2009) Entropy of interval-valued fuzzy sets based on distance and its relationship with similarity measure. Knowl Based Syst 22(6):449\u2013454","journal-title":"Knowl Based Syst"},{"issue":"12","key":"3474_CR36","doi-asserted-by":"publisher","first-page":"4308","DOI":"10.1016\/j.camwa.2011.09.031","volume":"62","author":"F Zhao","year":"2011","unstructured":"Zhao F, Huang H, Jin H et al (2011) A hybrid ranking approach to estimate vulnerability for dynamic attacks. Comput Math Appl 62(12):4308\u20134321","journal-title":"Comput Math Appl"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3474-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3474-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3474-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,19]],"date-time":"2020-01-19T05:45:39Z","timestamp":1579412739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3474-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,25]]},"references-count":36,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["3474"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3474-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,25]]},"assertion":[{"value":"25 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behave of all co-authors, we declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}