{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:14:34Z","timestamp":1774023274998,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004919","name":"King Abdul Aziz City for Science and Technology","doi-asserted-by":"publisher","award":["14-INF727-10"],"award-info":[{"award-number":["14-INF727-10"]}],"id":[{"id":"10.13039\/501100004919","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3050420","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T22:37:00Z","timestamp":1610231820000},"page":"10751-10764","source":"Crossref","is-referenced-by-count":23,"title":["Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1594-9115","authenticated-orcid":false,"given":"Sultan H.","family":"Almotiri","sequence":"first","affiliation":[{"name":"Computer Science Department, College of Computer and Information Science, Umm AlQura University, Makkah, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref39","first-page":"29","article-title":"Durability challenges in software engineering","volume":"52","author":"kumar","year":"2016","journal-title":"Crosstalk J of Defense Software Eng"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01209-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14257\/ijhit.2015.8.2.29"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2020.1231.09"},{"key":"ref31","first-page":"34","article-title":"Durable security in software development: Needs and importance","volume":"10","author":"kumar","year":"2015","journal-title":"CSI Commun"},{"key":"ref30","first-page":"23","article-title":"Software security durability","volume":"5","author":"kumar","year":"2014","journal-title":"Int J Comput Sci Technol"},{"key":"ref37","first-page":"615","article-title":"Measuring the security attributes through fuzzy analytic hierarchy process: Durability perspective","volume":"12","author":"kumar","year":"2018","journal-title":"ICIC Exp Lett"},{"key":"ref36","first-page":"1063","article-title":"Security assessment through fuzzy-Delphi analytic hierarchy process","volume":"12","author":"kumar","year":"2018","journal-title":"ICIC Express Letters - An International Journal of Research and Surveys"},{"key":"ref35","first-page":"36","article-title":"Software security: A risk taxonomy","volume":"3","author":"sahu","year":"2015","journal-title":"Int J Comput Sci Eng Technol"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.9734\/BJMCS\/2015\/19872"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"33","DOI":"10.18576\/isl\/090105","article-title":"Needs and importance of reliability prediction: An industrial perspective","volume":"9","author":"sahu","year":"2020","journal-title":"Inform Sci Lett"},{"key":"ref27","first-page":"1213","article-title":"Soft computing approach for prediction of software reliability","volume":"12","author":"sahu","year":"2018","journal-title":"ICIC Exp Lett"},{"key":"ref29","first-page":"23","article-title":"Software security testing a pertinent framework","volume":"5","author":"kumar","year":"2014","journal-title":"J Global Res Comput Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/692654"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.12.005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946776"},{"key":"ref22","first-page":"1247","article-title":"Risk management perspective in SDLC","volume":"4","author":"sahu","year":"2014","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-016-0123-y"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-981-13-1402-5_17","article-title":"Revisiting software reliability","author":"sahu","year":"2019","journal-title":"Data Management Analytics and Innovation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970245"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.215"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978038"},{"key":"ref10","author":"andress","year":"2014","journal-title":"The Basics of Information Security Understanding the Fundamentals of InfoSec in Theory and Practice"},{"key":"ref11","author":"burton","year":"2003","journal-title":"Cisco security professional's guide to secure intrusion detection systems"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"493","DOI":"10.3390\/sym12040493","article-title":"Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS","volume":"12","author":"khan","year":"2020","journal-title":"Symmetry"},{"key":"ref12","first-page":"89","article-title":"Real time data mining-based intrusion detection","volume":"1","author":"lee","year":"2001","journal-title":"Proc DARPA Inf Survivability Conf Expo II"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.145"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-31"},{"key":"ref15","article-title":"BotNet detection: Enhancing analysis by using data mining techniques","volume":"349","author":"alparslan","year":"2012","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-3203-3.ch005"},{"key":"ref17","first-page":"183","article-title":"Stability: Abstract roadmap of software security","volume":"15","author":"sahu","year":"2015","journal-title":"Amer Int J Res Sci Eng Math"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.190513.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30042-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.073"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204223"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7840\/kics.2016.41.2.277"},{"key":"ref5","author":"saha","year":"2005","journal-title":"Botnet An overview"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.15514\/SYRCOSE-2008-2-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s100440050015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(01)00068-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00008-9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48318-9_3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(95)00300-2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.07.023"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019829"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83555-1_5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2015.03.001"},{"key":"ref44","first-page":"1","article-title":"An integration of threat modeling with attack pattern and misuse case for effective security requirement elicitation","volume":"8","author":"ansari","year":"2017","journal-title":"Int J Adv Res Comput Sci"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.066"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09317724.pdf?arnumber=9317724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:58:10Z","timestamp":1662667090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9317724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3050420","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}