{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:41:51Z","timestamp":1770748911255,"version":"3.50.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000190","name":"U.S. Department of Commerce","doi-asserted-by":"publisher","award":["BS123456"],"award-info":[{"award-number":["BS123456"]}],"id":[{"id":"10.13039\/100000190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Aerosp. Electron. Syst."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/taes.2022.3212032","type":"journal-article","created":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T19:52:00Z","timestamp":1664913120000},"page":"2245-2251","source":"Crossref","is-referenced-by-count":11,"title":["Fuzzy Logic-Based Threat Assessment Application In Air Defense Systems"],"prefix":"10.1109","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2290-5292","authenticated-orcid":false,"given":"Muhittin","family":"Coskun","sequence":"first","affiliation":[{"name":"Selcuk University, Konya, Turkey"}]},{"given":"Sakir","family":"Tasdemir","sequence":"additional","affiliation":[{"name":"Faculty of Technology, Sel&#x00E7;uk University, Konya, Turkey"}]}],"member":"263","reference":[{"key":"ref13","first-page":"51","author":"johansson","year":"2010","journal-title":"Evaluating the Performance of TEWA Systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2016.7531012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2004.06.001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2014.03.009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2007.146"},{"key":"ref37","author":"newman","year":"1994","journal-title":"Foundations of Helicopter Flight"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.26555\/ijain.v1i2.18"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/9781118534786"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/12.106218"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/cem.1180050506"},{"key":"ref11","first-page":"110","author":"johansson","year":"2008","journal-title":"A Comparison Between Two Approaches to Threat Evaluation in an Air Defense Scenario"},{"key":"ref33","article-title":"Aeroservoelastic characteristics of the B-2 Bomber and implications for future large aircraft","author":"britt","year":"2000"},{"key":"ref10","first-page":"227","article-title":"Air defense threat evaluation using fuzzy Bayesian classifier","author":"mei","year":"2013","journal-title":"Proc 5th Int Joint Conf Comput Intell"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-32374-0_6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA458047"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2009.5089545"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2014.7097383"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2773258"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SCIS-ISIS.2012.6505178"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/6.619381"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2018.02.11"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2015.7162044"},{"key":"ref24","first-page":"3","article-title":"The missile defense review","volume":"13","author":"karako","year":"2019","journal-title":"Strategic Stud Q"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIDP47821.2019.9172943"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7249\/RR4368"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4324\/9781315000565"},{"key":"ref41","first-page":"29","article-title":"An overview on fuzzy logic and fuzzy elements","volume":"3","author":"jaiswal","year":"2015","journal-title":"International Journal of Research in Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/SBRA026E"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2019.12.009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1201\/9781420035520"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.364485"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35781-0"},{"key":"ref8","first-page":"2805","article-title":"Techniques for threat assessment based on adaptive intuitionistic fuzzy reasoning","volume":"29","author":"ying-jie","year":"2007","journal-title":"J Electron Inf Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1566-2535(03)00044-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2003.177361"},{"key":"ref3","first-page":"143","article-title":"Threat evaluation modelling for dynamic targets using fuzzy logic approach","author":"kumar","year":"2012","journal-title":"Proc Int Conf Comput Sci Eng"},{"key":"ref6","first-page":"2509","article-title":"Threat assessment method with uncertain attribute weight based on intuitionistic fuzzy multi-attribute decision","volume":"42","author":"wang","year":"2014","journal-title":"ACTA ELECTONICA SINICA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2002.1179979"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/5.364486"}],"container-title":["IEEE Transactions on Aerospace and Electronic Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7\/10146528\/09910955.pdf?arnumber=9910955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:53:47Z","timestamp":1687805627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9910955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/taes.2022.3212032","relation":{},"ISSN":["0018-9251","1557-9603","2371-9877"],"issn-type":[{"value":"0018-9251","type":"print"},{"value":"1557-9603","type":"electronic"},{"value":"2371-9877","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}