{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:42:31Z","timestamp":1753519351652,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995753","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:53:52Z","timestamp":1672764832000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Direct Trust in Cloud Computing Based on Fuzzy Logic"],"prefix":"10.1109","author":[{"given":"Waleed T.","family":"Al-Sit","sequence":"first","affiliation":[{"name":"Mu&#x0027;tah University,Department of Computer Engineering,Al-karak,Jordan"}]},{"given":"Karamath","family":"Ateeq","sequence":"additional","affiliation":[{"name":"School of Information Technology, Skyline University College, University City Sharjah,Sharjah,UAE,1797"}]},{"given":"Syed Quadir","family":"Moinuddin","sequence":"additional","affiliation":[{"name":"ICFAI Foundation for Higher Education,Department of Mechatronics Engineering,Hyderabad,India"}]},{"given":"Shoukat","family":"Aslam","sequence":"additional","affiliation":[{"name":"National College of Business Administration and Economics,Lahore,Pakistan"}]},{"given":"Abdur","family":"Rehman","sequence":"additional","affiliation":[{"name":"Riphah International University,Dept. of Computer Science,Lahore,Pakistan"}]},{"given":"Tayba","family":"Asgher","sequence":"additional","affiliation":[{"name":"Riphah International University,Dept. of Computer Science,Lahore,Pakistan"}]},{"given":"Ossma Ali","family":"Thawabeh","sequence":"additional","affiliation":[{"name":"Skyline University College, University City Sharjah,Sharjah,UAE,1797"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TSMC.1985.6313408"},{"key":"ref35","first-page":"i","volume":"1","author":"muhammad","year":"2022","journal-title":"Intelligent Intrusion Detection System for Apache Web Server Empowered with Machine Learning Approaches International Journal of Computational and Innovative Sciences"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-540-30232-2_1"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/ICOMET.2019.8673401"},{"key":"ref15","first-page":"2ll","article-title":"1998, The Effects of Fuzziness in Fuzzy Logic Controllers","author":"aitas","year":"0","journal-title":"2nd International Symposium on Intelligent Manufacturing Systems"},{"key":"ref37","first-page":"21","article-title":"XML-based Descriptive Language for Cognitive Architectures","volume":"1","author":"nasir","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref14","first-page":"227","volume":"25","author":"altas","year":"1992","journal-title":"A Fuzzy Logic Power Tracking Controller For A Photovoltaic Energy Conversion Scheme Electric Power Systems Research"},{"key":"ref36","first-page":"69","article-title":"AA Novel Method to improve the Round Robin CPU Scheduling Quantum time using Arithmetic Mean","volume":"1","author":"akmal","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ICBATS54253.2022.9758929"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICECCE47252.2019.8940752"},{"key":"ref11","first-page":"57","volume":"34","author":"dyer","year":"2001","journal-title":"Building the IBM 4758 secure coprocessor Computer"},{"key":"ref33","article-title":"MapReduce based intelligent model for intrusion detection using machine learning technique","volume":"in press","author":"asif","year":"2021","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"ref10","first-page":"20","volume":"12","author":"khaled","year":"2010","journal-title":"Establishing trust in cloud computing cloud computing IT Professional"},{"key":"ref32","volume":"in press","author":"saleem","year":"2022","journal-title":"Smart cities Fusion-based intelligent traffic congestion control system for vehicular networks using machine learning techniques Egyptian Informatics Journal"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICSPS.2010.5555234"},{"year":"0","journal-title":"Cloud Computing Tutorials","key":"ref1"},{"year":"1993","author":"herrera","journal-title":"Generating Fuzzy Rules from Examples using Genetic Algorithms Dept of Computer Science and Artificial Intelligence Technical Report #DECSAI93115","key":"ref17"},{"key":"ref39","first-page":"i","article-title":"AA systematic review: Explainable Artificial Intelligence (XAI) based disease prediction","volume":"1","author":"muneer","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICNN.1993.298698"},{"key":"ref38","first-page":"4","article-title":"Role of image processing in digital forensics and cybercrime detection","volume":"1","author":"muhammad","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref19","first-page":"202","volume":"8","author":"gonz'alez","year":"1996","journal-title":"A learning system of fuzzy control rules based on genetic algorithms Genetic Algorithms and Soft Computing (F Herrera J L Verdegay eds ) Physica-Verlag Studies in Fuzzyness"},{"key":"ref18","first-page":"193","article-title":"Fuzzy Clustering and Fuzzy Rules","author":"klawonn","year":"0","journal-title":"Proc 7th Intern Fuzzy Systems Association World Congress (IFSA'97) Vol I Academia Prague"},{"key":"ref24","first-page":"5511","volume":"71","author":"ayvaz","year":"2022","journal-title":"Abdusalomov Akmalbek Bobomirzaevich3 Automatic Speaker Recognition Using Mel-Frequency Cepstral Coefficients Through Machine Learning CMC- Computers Materials & Continua"},{"key":"ref23","first-page":"4767","volume":"71","author":"waseem iqbal","year":"2022","journal-title":"Mobile Devices Interface Adaptivity Using Ontologies using Machine learning CMC-Computers Materials & Continua"},{"key":"ref26","first-page":"5911","volume":"71","author":"adnan khan","year":"2022","journal-title":"Emotion Based Signal Enhancement Through Multisensory Integration Using Machine Learning CMC-Computers Materials & Continua"},{"key":"ref25","first-page":"5603","volume":"71","author":"mehmood","year":"2022","journal-title":"Sentiment Analysis in Social Media for Competitive Environment Using Content Analysis CMC- Computers Materials & Continua"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1155\/2018\/6759526"},{"key":"ref42","article-title":"Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications","volume":"63","author":"ghazal","year":"2020","journal-title":"Solid State Technology"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"3399","DOI":"10.32604\/cmc.2022.020173","article-title":"Data Fusion-based machine learning architecture for intrusion detection","volume":"70","author":"ghazal","year":"2022","journal-title":"Computers Materials & Continua"},{"key":"ref22","first-page":"3607","volume":"71","author":"khan","year":"2022","journal-title":"Intelligent Model for Predicting the Quality of Services Violation using Machine learning CMC- Computers Materials & Continua"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1155\/2020\/8017496"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/ICBATS54253.2022.9759059"},{"key":"ref28","first-page":"51","article-title":"Evaluation of planet factors of smart city through multilayer fuzzy logic (MFL)","volume":"11","author":"fatima","year":"2019","journal-title":"ISC International Journal of Information Security"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-022-12181-w","article-title":"An energy- aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things","volume":"12","author":"rahmani","year":"2022","journal-title":"Scientific Reports"},{"key":"ref29","first-page":"188","volume":"6","author":"fatima","year":"2020","journal-title":"loT enabled smart monitoring of coronavirus empowered with fuzzy inference system International journal of advance research ideas and innovations in technology"},{"year":"2011","author":"fan","journal-title":"Trusted estimation in a virtual team-A decision support method Expert System with Application","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.renene.2007.03.002"},{"key":"ref9","first-page":"245","volume":"48","author":"ozaa","year":"2006","journal-title":"Trust in software outsourcing relationships An empirical investigation of Indian software companies Information and Software Technology"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.istr.2011.08.005"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.istr.2011.08.006"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/91.493904","volume":"4","author":"zadeh","year":"0","journal-title":"Fuzzy Logic = Computing with Words IEEE Transaction on Fuzzy System"},{"year":"2016","author":"ritu","journal-title":"A Trust Model in cloud computing based on fuzzy logic (R TEICT) IEEE Explore","key":"ref5"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.32604\/iasc.2022.019892","article-title":"Fusion-based supply chain collaboration using machine learning techniques","volume":"31","author":"ghazal","year":"2022","journal-title":"Intelligent Automation & Soft Computing"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995753.pdf?arnumber=9995753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T14:57:57Z","timestamp":1675090677000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995753","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}