{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:52:34Z","timestamp":1769849554542,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission through the Smart Network Operator Platform enabling Shared, Integrated and more Sustainable Urban Freight Logistics (SENATOR) Project","doi-asserted-by":"publisher","award":["H2020MG-2018-2020"],"award-info":[{"award-number":["H2020MG-2018-2020"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research and Innovation Action","award":["861"],"award-info":[{"award-number":["861"]}]},{"name":"Research and Innovation Action","award":["540"],"award-info":[{"award-number":["540"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3294229","type":"journal-article","created":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T17:26:31Z","timestamp":1689096391000},"page":"85050-85066","source":"Crossref","is-referenced-by-count":11,"title":["Novel Dual Partitioned Maclaurin Symmetric Mean Operators for the Selection of Computer Network Security System With Complex Intuitionistic Fuzzy Setting"],"prefix":"10.1109","volume":"11","author":[{"given":"Muhammad","family":"Azam","sequence":"first","affiliation":[{"name":"Faculty of Science, Beijing University of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3683-6582","authenticated-orcid":false,"given":"Muhammad Sajjad Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Khushal Khan Khattak University, Karak, Pakistan"}]},{"given":"Shilin","family":"Yang","sequence":"additional","affiliation":[{"name":"Faculty of Science, Beijing University of Technology, Beijing, China"}]},{"given":"Saeed Ullah","family":"Jan","sequence":"additional","affiliation":[{"name":"Department of Library and Information Science, Khushal Khan Khattak University, Karak, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0399-7486","authenticated-orcid":false,"given":"Tapan","family":"Senapati","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Southwest University, Beibei, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4587-7482","authenticated-orcid":false,"given":"Sarbast","family":"Moslem","sequence":"additional","affiliation":[{"name":"School of Architecture Planning and Environmental Policy, University College Dublin, Belfield, Dublin, Ireland"}]},{"given":"Wali Khan","family":"Mashwani","sequence":"additional","affiliation":[{"name":"Institute of Numerical Sciences, Kohat University of Science and Technology, Kohat, Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(86)80034-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.06.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00110-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/int.21939"},{"issue":"3","key":"ref7","first-page":"267","article-title":"Sulle medie multiple di potenze","volume":"5","author":"Bonferroni","year":"1950","journal-title":"Bolletino dell\u2019Unione Matematica Italiana"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622016500346"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2072918"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.016"},{"key":"ref11","first-page":"59","article-title":"A second letter to Martin Folkes, Esq concerning the roots of equations, with demonstration of other rules of algebra","volume":"36","author":"Maclaurin","year":"1729","journal-title":"Philos. Trans. Roy. Soc. London Ser. A"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3846\/tede.2018.3698"},{"key":"ref13","first-page":"710","article-title":"Intuitionistic fuzzy partitioned Maclaurin mean operators","volume-title":"Proc. Int. Conf. Mach. Learn. Cybern.","author":"Liu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s44196-021-00002-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-18801"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/int.22684"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.201215.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/91.995119"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2003.814832"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/1.4757515"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1063\/1.4858782"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3413-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09772-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-019-09678-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3934\/jimo.2020069"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-019-09631-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9704466"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2016.48"},{"key":"ref30","first-page":"11","article-title":"Post-processing audit tools and techniques","volume-title":"Proc. NBS Invitational Workshop","author":"Neumann"},{"key":"ref31","volume-title":"How NIST\u2019s Cybersecurity Framework Protects the Cia Triad","author":"Luke","year":"2018"},{"key":"ref32","volume-title":"The CIA triad","author":"Chad","year":"2012"},{"key":"ref33","article-title":"Engineering principles for information technology security","author":"Stoneburner","year":"2004"},{"key":"ref34","first-page":"1","article-title":"Computer security and mobile security challenges","volume-title":"Proc. Tech Secur. Conf.","author":"Zlatanov"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"ref36","article-title":"New polymorphic malware evades three quarters of AV","author":"Millman","year":"2017"},{"key":"ref37","volume-title":"Phishers send fake invoices","author":"Lazarus","year":"2020"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10177937.pdf?arnumber=10177937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T03:39:49Z","timestamp":1710387589000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10177937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3294229","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}