{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T19:14:58Z","timestamp":1769714098392,"version":"3.49.0"},"reference-count":76,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,7,2]]},"abstract":"<jats:p>Computer network security evaluation is a basic work to determine the security performance of the network system and implement the network security management. It involves organizational management, network technology, personnel psychology, social environment and other factors. In recent years, with the rapid development of information technology in China, the problem of computer network security has become increasingly prominent. Although domestic and foreign scholars have sought effective methods of network security evaluation from different aspects and using different methods, many factors involved in network security are difficult to quantify, so far, there is no relatively mature quantitative evaluation method of network security. The computer network security evaluation is classical multiple attribute decision making (MADM) problems. In this article, based on projection measure, we shall introduce the projection models with q-rung orthopair fuzzy information. First of all, the definition of q-rung orthopair fuzzy sets (q-ROFSs) is introduced. In addition, to fuse overall q-rung orthopair fuzzy evaluation information, two aggregation operators including q-ROFWA and q-ROFWG operators is introduced. Furthermore, combine projection with q-ROFSs, we develop the projection models with q-rung orthopair fuzzy information. Based on developed weighted projection models, the multiple attribute decision making model is established and all computing steps are simply depicted. Finally, a numerical example for computer network security evaluation is given to illustrate this new model and some comparisons between the new proposed models and q-ROFWA and q-ROFWG operators are also conducted to illustrate advantages of the new built method.<\/jats:p>","DOI":"10.3233\/jifs-231351","type":"journal-article","created":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T21:38:17Z","timestamp":1683668297000},"page":"1029-1038","source":"Crossref","is-referenced-by-count":3,"title":["A novel MADM technique based on projection methods under q-rung orthopair fuzzy setting and its application to computer network security evaluation"],"prefix":"10.1177","volume":"45","author":[{"given":"Wenbao","family":"Qiao","sequence":"first","affiliation":[{"name":"Nanjing University of Finance & Economics, Nanjing, Jiangsu, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-231351_ref1","doi-asserted-by":"crossref","first-page":"3626","DOI":"10.1007\/s40815-022-01350-8","article-title":"CODAS Method for Multi-Attribute Decision-Making Based on Some Novel Distance and Entropy Measures Under Probabilistic Dual Hesitant Fuzzy Sets","volume":"24","author":"Ning","year":"2022","journal-title":"International Journal of Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref2","doi-asserted-by":"crossref","first-page":"7377","DOI":"10.3233\/JIFS-221001","article-title":"An integrated methodology for selecting the building material suppliers with interval-valued intuitionistic fuzzy information","volume":"43","author":"Xu","year":"2022","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref3","doi-asserted-by":"crossref","first-page":"119114","DOI":"10.1016\/j.eswa.2022.119114","article-title":"An extended Exp-TODIM method for multiple attribute decision making based on the Z-Wasserstein distance","volume":"214","author":"Sun","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JIFS-231351_ref4","doi-asserted-by":"crossref","first-page":"3495","DOI":"10.1016\/j.apm.2013.11.045","article-title":"An extended compromise ratio model with an application to reservoir flood control operation under an interval-valued intuitionistic fuzzy environment","volume":"38","author":"Hashemi","year":"2014","journal-title":"Applied Mathematical Modelling"},{"key":"10.3233\/JIFS-231351_ref5","doi-asserted-by":"crossref","first-page":"7299","DOI":"10.3233\/JIFS-211156","article-title":"Complex hesitant fuzzy sets and its applications in multiple attributes decision-making problems","volume":"41","author":"Talafha","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref6","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1155\/2021\/9921553","article-title":"Novel Dombi Aggregation Operators in Spherical Cubic Fuzzy Information with Applications in Multiple Attribute Decision-Making","volume":"2021","author":"Tehreem","year":"2021","journal-title":"Mathematical Problems in Engineering"},{"key":"10.3233\/JIFS-231351_ref7","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s40815-020-00970-2","article-title":"Frank Aggregation Operators and Their Application to ProbabilisticHesitant Fuzzy Multiple Attribute Decision-Making","volume":"23","author":"Yahya","year":"2021","journal-title":"International Journal of Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref8","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1177\/21582440221087268","article-title":"A Hybrid Multiple-Attribute Decision-Making Model for Evaluating the Esthetic Expression of Environmental Design Schemes","volume":"12","author":"Zhu","year":"2022","journal-title":"Sage Open"},{"key":"10.3233\/JIFS-231351_ref9","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s10796-013-9407-z","article-title":"A new methodology to support group decision-making for IoT-based emergency response systems","volume":"16","author":"Li","year":"2014","journal-title":"Information Systems Frontiers"},{"key":"10.3233\/JIFS-231351_ref10","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1142\/S0218488514500366","article-title":"Dependent Interval 2-Tuple Linguistic Aggregation Operators and Their Application to Multiple Attribute Group Decision Making","volume":"22","author":"Liu","year":"2014","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge-Based Systems"},{"key":"10.3233\/JIFS-231351_ref11","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.ins.2021.07.055","article-title":"Multiattribute decision making using novel score function of interval-valued intuitionistic fuzzy values and the means and the variances of score matrices","volume":"577","author":"Chen","year":"2021","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-231351_ref12","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1016\/j.ins.2021.07.074","article-title":"Multiattribute decision making based on new score function of interval-valued intuitionistic fuzzy values and normalized score matrices","volume":"575","author":"Chen","year":"2021","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-231351_ref13","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1155\/2021\/6630898","article-title":"Similarity Measures between Intuitionistic Fuzzy Credibility Sets and Their Multicriteria Decision-Making Method for the Performance Evaluation of Industrial Robots","volume":"2021","author":"Ye","year":"2021","journal-title":"Mathematical Problems in Engineering"},{"key":"10.3233\/JIFS-231351_ref14","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3390\/su14073795","article-title":"An Interval-Valued Intuitionistic Fuzzy Model Based on Extended VIKOR and MARCOS for Sustainable Supplier Selection in Organ Transplantation Networks for Healthcare Devices","volume":"14","author":"Salimian","year":"2022","journal-title":"Sustainability"},{"key":"10.3233\/JIFS-231351_ref15","doi-asserted-by":"crossref","first-page":"563","DOI":"10.3233\/JIFS-219212","article-title":"Intuitionistic fuzzy two-factor variance analysis of movie ticket sales","volume":"42","author":"Traneva","year":"2022","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.engappai.2021.104568","article-title":"Information Quality for Intuitionistic Fuzzy Values with Its Application in Decision Making","volume":"109","author":"Xie","year":"2022","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10.3233\/JIFS-231351_ref17","doi-asserted-by":"crossref","first-page":"3220","DOI":"10.1002\/int.22191","article-title":"Some Dombi aggregation of Q-rung orthopair fuzzy numbers in multiple-attribute decision making","volume":"34","author":"Jana","year":"2019","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref18","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1109\/TFUZZ.2016.2604005","article-title":"Generalized Orthopair Fuzzy Sets","volume":"25","author":"Yager","year":"2017","journal-title":"Ieee Transactions on Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref19","doi-asserted-by":"crossref","first-page":"10309","DOI":"10.1007\/s00500-021-05771-9","article-title":"Group decision-making framework under linguistic q-rung orthopair fuzzy Einstein models","volume":"25","author":"Akram","year":"2021","journal-title":"Soft Computing"},{"key":"10.3233\/JIFS-231351_ref20","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.3233\/JIFS-201605","article-title":"Geometric-arithmetic energy and atom bond connectivity energy of dual hesitant q-rung orthopair fuzzy graphs","volume":"40","author":"Akram","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref21","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1007\/s40747-020-00203-x","article-title":"Generalized dice similarity measures for complex q-Rung Orthopair fuzzy sets and its application","volume":"7","author":"Garg","year":"2021","journal-title":"Complex & Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref22","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1155\/2021\/5534915","article-title":"Some Similarity and Distance Measures between Complex Interval-Valued q-Rung Orthopair Fuzzy Sets Based on Cosine Function and their Applications","volume":"2021","author":"Garg","year":"2021","journal-title":"Mathematical Problems in Engineering"},{"key":"10.3233\/JIFS-231351_ref23","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1155\/2021\/5540529","article-title":"New Logarithmic Operational Laws-Based Complex q-Rung Orthopair Fuzzy Aggregation Operators and Their Application in Decision-Making Process","volume":"2021","author":"Garg","year":"2021","journal-title":"Complexity"},{"key":"10.3233\/JIFS-231351_ref24","doi-asserted-by":"crossref","first-page":"11287","DOI":"10.3233\/JIFS-202440","article-title":"Complex q-rung orthopair fuzzy Schweizer-Sklar Muirhead mean aggregation operators and their application in multi-criteria decision-making","volume":"40","author":"Liu","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref25","doi-asserted-by":"crossref","first-page":"9085","DOI":"10.3233\/JIFS-201526","article-title":"Multi-attributive border approximation area comparison (MABAC), method based on normal q-rung orthopair fuzzy environment","volume":"40","author":"Liu","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231351_ref26","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.jclepro.2020.125191","article-title":"A decision algorithm for selecting the design scheme for blockchain-based agricultural product traceability system in q-rung orthopair fuzzy environment","volume":"290","author":"Yang","year":"2021","journal-title":"Journal of Cleaner Production"},{"key":"10.3233\/JIFS-231351_ref27","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1002\/int.22657","article-title":"Neutrality aggregation operators based on complex q-rung orthopair fuzzy sets and their applications in multiattribute decision-making problems","volume":"37","author":"Garg","year":"2022","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref28","doi-asserted-by":"crossref","unstructured":"Bai K.Y. , Zhu X.M. , Wang J. and Zhang R.T. , Some Partitioned Maclaurin Symmetric Mean Based on q-Rung Orthopair Fuzzy Information for Dealing with Multi-Attribute Group Decision Making, Symmetry-Basel 10 (2018).","DOI":"10.3390\/sym10090383"},{"key":"10.3233\/JIFS-231351_ref29","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1002\/int.21927","article-title":"Some q-Rung Orthopair Fuzzy Aggregation Operators and their Applications to Multiple-Attribute Decision Making","volume":"33","author":"Liu","year":"2018","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref30","doi-asserted-by":"crossref","first-page":"2341","DOI":"10.1002\/int.22032","article-title":"Multiple attribute group decision making based on q-rung orthopair fuzzy Heronian mean operators","volume":"33","author":"Liu","year":"2018","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref31","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1002\/int.21985","article-title":"Some q-rung orthopair fuzzy Heronian mean operators in multiple attribute decision making","volume":"33","author":"Wei","year":"2018","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref32","doi-asserted-by":"crossref","first-page":"2255","DOI":"10.1002\/int.22028","article-title":"Exponential operation andaggregation operator for q-rung orthopair fuzzy set and theirdecision-making method with a new score function","volume":"33","author":"Peng","year":"2018","journal-title":"InternationalJournal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref33","doi-asserted-by":"crossref","unstructured":"Wang R. and Li Y.L. , A Novel Approach for Green Supplier Selection under a q-Rung Orthopair Fuzzy Environment, Symmetry-Basel 10 (2018).","DOI":"10.3390\/sym10120687"},{"key":"10.3233\/JIFS-231351_ref34","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1002\/int.22042","article-title":"Some q-rung orthopair fuzzy maclaurin symmetric mean operators and their applications to potential evaluation of emerging technology commercialization","volume":"34","author":"Wei","year":"2019","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSMC.2018.2841063","article-title":"Multiple-Attribute Group Decision-Making Based on q-Rung Orthopair Fuzzy Power Maclaurin Symmetric Mean Operators","volume":"PP","author":"Liu","year":"2018","journal-title":"IEEE Transactions on Systems Man & Cybernetics Systems"},{"key":"10.3233\/JIFS-231351_ref36","doi-asserted-by":"crossref","unstructured":"Liu P. and Liu J. , Some q-Rung Orthopai Fuzzy Bonferroni Mean Operators and Their Application to Multi-Attribute Group Decision Making, International Journal of Intelligent Systems 33 (2018).","DOI":"10.1002\/int.21933"},{"key":"10.3233\/JIFS-231351_ref37","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1002\/int.22060","article-title":"New q-rung orthopair fuzzy partitioned Bonferroni mean operators and their application in multiple attribute decision making","volume":"34","author":"Yang","year":"2019","journal-title":"International Journal of Intelligent Systems"},{"key":"10.3233\/JIFS-231351_ref39","doi-asserted-by":"crossref","first-page":"340","DOI":"10.3390\/math7040340","article-title":"Similarity Measures of q-Rung Orthopair Fuzzy Sets Based on Cosine Function and Their Applications","volume":"7","author":"Wang","year":"2019","journal-title":"Mathematics"},{"key":"10.3233\/JIFS-231351_ref41","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0360-8352(98)00092-8","article-title":"A neural network based computer access security system for multiple users","volume":"35","author":"Anagun","year":"1998","journal-title":"Comput Ind Eng"},{"key":"10.3233\/JIFS-231351_ref42","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","article-title":"A hybrid intrusion detection system design for computer network security","volume":"35","author":"Aydin","year":"2009","journal-title":"Comput Electr Eng"},{"key":"10.3233\/JIFS-231351_ref43","first-page":"202","article-title":"Security protection of computer network information under the background of big data","volume":"127","author":"Yang","year":"2020","journal-title":"Basic Clin. Pharmacol Toxicol"},{"key":"10.3233\/JIFS-231351_ref44","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/s41284-020-00230-w","article-title":"Automated monitoring for security camera networks: promise from computer vision labs","volume":"34","author":"Chen","year":"2021","journal-title":"Secur J"},{"key":"10.3233\/JIFS-231351_ref45","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1155\/2021\/2295130","article-title":"Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security","volume":"2021","author":"He","year":"2021","journal-title":"Wirel Commun Mob Comput"},{"key":"10.3233\/JIFS-231351_ref46","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1155\/2021\/2297733","article-title":"Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things","volume":"2021","author":"Wang","year":"2021","journal-title":"Wirel. Commun. Mob. Comput"},{"key":"10.3233\/JIFS-231351_ref47","doi-asserted-by":"crossref","first-page":"11","DOI":"10.3390\/s22010011","article-title":"An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks","volume":"2021","author":"Wang","year":"2021","journal-title":"J Sens"},{"key":"10.3233\/JIFS-231351_ref48","doi-asserted-by":"crossref","first-page":"6889","DOI":"10.3233\/JIFS-189520","article-title":"Research on computer network information security based on improved machine learning","volume":"40","author":"Yu","year":"2021","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-231351_ref49","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1109\/COMST.2021.3086475","article-title":"A Review of Computer Vision Methods in Network Security","volume":"23","author":"Zhao","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"10.3233\/JIFS-231351_ref50","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1155\/2022\/9023904","article-title":"Computer Network Information System Security Prevention Methods under the Background of Big Data","volume":"2022","author":"Cai","year":"2022","journal-title":"Math Probl Eng"},{"key":"10.3233\/JIFS-231351_ref51","first-page":"7","article-title":"Application of Data Image Encryption Technology in Computer Network Information Security","volume":"2022","author":"Li","year":"2022","journal-title":"Math Probl Eng"},{"key":"10.3233\/JIFS-231351_ref52","first-page":"8","article-title":"Application of Data Encryption Technology in Computer Network Information Security","volume":"2022","author":"Li","year":"2022","journal-title":"Secur. Commun. Netw"},{"key":"10.3233\/JIFS-231351_ref53","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1155\/2022\/5490779","article-title":"The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security","volume":"2022","author":"Lin","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"10.3233\/JIFS-231351_ref54","first-page":"10","article-title":"The Application of Data Encryption Technology in Computer Network Communication Security","volume":"2022","author":"Liu","year":"2022","journal-title":"Mob Inf Syst"},{"key":"10.3233\/JIFS-231351_ref55","first-page":"10","article-title":"Computer Network Confidential Information Security Based on Big Data Clustering Algorithm","volume":"2022","author":"Liu","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"10.3233\/JIFS-231351_ref56","first-page":"13","article-title":"The Construction Method of Computer Network Security Defense System Based on Multisource Big Data","volume":"2022","author":"Ma","year":"2022","journal-title":"Sci Program"},{"key":"10.3233\/JIFS-231351_ref57","doi-asserted-by":"crossref","first-page":"7871","DOI":"10.1007\/s00500-022-06813-6","article-title":"Computer application under the management of network information security technology using genetic algorithm","volume":"26","author":"Qiang","year":"2022","journal-title":"Soft Comput"},{"key":"10.3233\/JIFS-231351_ref58","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.future.2021.09.018","article-title":"AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis","volume":"127","author":"Shandilya","year":"2022","journal-title":"Futur Gener Comp Syst"},{"key":"10.3233\/JIFS-231351_ref59","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1155\/2022\/6873087","article-title":"Computer Network Security Management of Data Encryption Technology","volume":"2022","author":"Sun","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"10.3233\/JIFS-231351_ref60","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1155\/2022\/3170164","article-title":"Computer Network Information Security Monitoring System Based on Big Data Era","volume":"2022","author":"Sun","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.3233\/JIFS-231351_ref61","doi-asserted-by":"crossref","first-page":"16","DOI":"10.4018\/JGIM.295450","article-title":"Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime","volume":"30","author":"Wang","year":"2022","journal-title":"J Glob Inf Manag"},{"key":"10.3233\/JIFS-231351_ref62","first-page":"7","article-title":"Application Research of Data Encryption Technology in Computer Network Information Security","volume":"2022","author":"Wang","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.3233\/JIFS-231351_ref63","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1177\/0894439304273274","article-title":"Creating a worldwide community security structure using individually maintained home computers: The e-JIKEI network project","volume":"23","author":"Fujii","year":"2005","journal-title":"Soc Sci Comput Rev"},{"key":"10.3233\/JIFS-231351_ref64","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1002\/dac.729","article-title":"Computer and network security risk management: Theory, challenges, and countermeasures","volume":"18","author":"Hamdi","year":"2005","journal-title":"Int J Commun Syst"},{"key":"10.3233\/JIFS-231351_ref65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2005.06.004","article-title":"Network and information security: A computational intelligence approach Special Issue of Journal of Network and Computer Applications","volume":"30","author":"Abraham","year":"2007","journal-title":"J Netw Comput Appl"},{"key":"10.3233\/JIFS-231351_ref66","doi-asserted-by":"crossref","first-page":"2032","DOI":"10.1016\/j.comcom.2007.03.007","article-title":"Using the vulnerability information of computer systems to improve the network security","volume":"30","author":"Lai","year":"2007","journal-title":"Comput Commun"},{"key":"10.3233\/JIFS-231351_ref67","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.cose.2008.03.004","article-title":"A global security architecture for intrusion detection on computer networks","volume":"27","author":"Ganame","year":"2008","journal-title":"Comput Secur"},{"key":"10.3233\/JIFS-231351_ref68","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1016\/j.camwa.2011.06.035","article-title":"A model for evaluating computer network security systemswith 2-tuple linguistic information,","volume":"62","author":"Zhang","year":"2011","journal-title":"Comput Math Appl"},{"key":"10.3233\/JIFS-231351_ref69","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.clsr.2012.07.008","article-title":"Computer, Law & Security Review \u2013special issue Trust in the Information Society \u2013ICRI 20th anniversary conference \u2013\u201cTrust in the information society \u2013In searchof trust generating mechanisms for the network society\u201d","volume":"28","author":"Valcke","year":"2012","journal-title":"Comput Law Secur Rev"},{"key":"10.3233\/JIFS-231351_ref70","doi-asserted-by":"crossref","first-page":"2029","DOI":"10.3233\/IFS-141458","article-title":"An approach to network security evaluation of computer network information system with triangular fuzzy information","volume":"28","author":"Guo","year":"2015","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-231351_ref71","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1108\/OIR-01-2015-0010","article-title":"Computer Network Security and Cyber Ethics, 4th edition","volume":"39","author":"Mason","year":"2015","journal-title":"Online Inf Rev"},{"key":"10.3233\/JIFS-231351_ref72","doi-asserted-by":"crossref","first-page":"6021","DOI":"10.3233\/JIFS-179184","article-title":"Computer network security technology based on artificial intelligence","volume":"37","author":"Hua","year":"2019","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-231351_ref73","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3233\/JIFS-179065","article-title":"Computer network security evaluation model based on neural network","volume":"37","author":"Li","year":"2019","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-231351_ref74","doi-asserted-by":"crossref","first-page":"3197","DOI":"10.3233\/JIFS-179121","article-title":"Computer network security evaluation simulation model based on neural network","volume":"37","author":"Tang","year":"2019","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-231351_ref75","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.is.2016.02.006","article-title":"Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools","volume":"60","author":"Wurzenberger","year":"2016","journal-title":"Inf Syst"},{"key":"10.3233\/JIFS-231351_ref76","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1002\/cae.21797","article-title":"Exploring Students\u2019 Experiences in Using a Physical Laboratory for Computer Networks and Data Security","volume":"25","author":"Stojanov","year":"2017","journal-title":"Comput Appl Eng Educ"},{"key":"10.3233\/JIFS-231351_ref77","first-page":"91","article-title":"A risk assessment standard and application method of computer network information security","volume":"123","author":"Sun","year":"2018","journal-title":"Basic Clin Pharmacol Toxicol"},{"key":"10.3233\/JIFS-231351_ref78","doi-asserted-by":"crossref","first-page":"2887","DOI":"10.3233\/JIFS-169643","article-title":"Intelligent evaluation of computer network security based on neural network","volume":"35","author":"Wang","year":"2018","journal-title":"J Intell Fuzzy Syst"}],"updated-by":[{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"record-id":"64006"},{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000}}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-231351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:55:42Z","timestamp":1769673342000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-231351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,2]]},"references-count":76,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-231351","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,2]]}}}