{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:31:40Z","timestamp":1763037100577},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fuzz-ieee.2017.8015510","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T16:55:37Z","timestamp":1503593737000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["Logistic informatics modelling using concept of stratification (CST)"],"prefix":"10.1109","author":[{"given":"Mehdi Rajabi","family":"Asadabadi","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Saberi","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Situation Awareness Information Dominance & Information Warfare","year":"1997","author":"endsley","key":"ref10"},{"journal-title":"Handbook of Graph Theory","year":"2004","author":"gross","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijiec.2014.7.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2011.6118113"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijiec.2015.4.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/sbe-2016-0001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1108\/IJQRM-07-2014-0091"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10287-017-0276-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2013.6611344"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2011.576502"},{"key":"ref4","article-title":"A Fuzzy Galois Lattices Approach to Requirements Elicitation for Cloud Services","author":"koitz","year":"2015","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29854-2_8"},{"key":"ref6","article-title":"Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns","author":"bou-harb","year":"2016","journal-title":"IEEE Network"},{"key":"ref5","article-title":"Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic","author":"platenius","year":"2016","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.67"},{"key":"ref7","first-page":"1","article-title":"The big data opportunity","author":"yiu","year":"2012","journal-title":"Policy Exchange"},{"key":"ref2","first-page":"227","article-title":"Stratified Programming Integrated Development Environment (SPIDER)","author":"dascalu","year":"2003","journal-title":"IASSE"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.047"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2003.1233837"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.10.013"}],"event":{"name":"2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2017,7,9]]},"location":"Naples, Italy","end":{"date-parts":[[2017,7,12]]}},"container-title":["2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8011834\/8015374\/08015510.pdf?arnumber=8015510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T00:48:58Z","timestamp":1504745338000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8015510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2017.8015510","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}