{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:55Z","timestamp":1776926335667,"version":"3.51.2"},"reference-count":31,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065011","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T07:53:23Z","timestamp":1752220403000},"page":"4699-4727","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Classification of Cyber Threat Detection Techniques for Next-Generation Cyber Defense via Hesitant Bipolar Fuzzy Frank Information"],"prefix":"10.32604","volume":"84","author":[{"given":"Hafiz Muhammad","family":"Waqas","sequence":"first","affiliation":[]},{"given":"Tahir","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Walid","family":"Emam","sequence":"additional","affiliation":[]},{"given":"Ubaid","family":"ur Rehman","sequence":"additional","affiliation":[]},{"given":"Dragan","family":"Pamucar","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"179","DOI":"10.32996\/jcsts.2024.6.1.19","article-title":"Next-generation cyber threat detection and mitigation strategies: a focus on artificial intelligence and machine learning","volume":"6","author":"Labu","year":"2024","journal-title":"J Comput Sci Technol Studies"},{"key":"ref2","series-title":"2020 International Conference on Cyber Warfare and Security (ICCWS)","first-page":"1","article-title":"Cyber threat detection using machine learning techniques: a performance evaluation perspective","author":"Shaukat","year":"2020"},{"key":"ref3","first-page":"1","article-title":"Current trends and future directions exploring machine learning techniques for cyber threat detection","volume":"3","author":"Balantrapu","year":"2024","journal-title":"Int J Sustain Dev Through AI, ML IoT"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"165607","DOI":"10.1109\/ACCESS.2019.2953095","article-title":"Cyber threat detection based on artificial neural networks using event profiles","volume":"7","author":"Lee","year":"2019","journal-title":"IEEE Access"},{"key":"ref5","series-title":"2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS)","first-page":"1","article-title":"Cybersecurity threat detection using deep learning and anomaly detection techniques","author":"Rajendran","year":"2024 Apr"},{"key":"ref6","first-page":"11","article-title":"Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms","volume":"13","author":"Aminu","year":"2024","journal-title":"Int J Comput Appl Technol Res"},{"key":"ref7","first-page":"325","article-title":"Advancing threat detection: utilizing deep learning models for enhanced cybersecurity protocols","volume":"18","author":"Maddireddy","year":"2024","journal-title":"Rev Esp Doc Cient"},{"key":"ref8","first-page":"18","article-title":"Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering","volume":"2","author":"Lakhno","year":"2016","journal-title":"East-Europ J Enterp Technol"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"5883","DOI":"10.3390\/s22155883","article-title":"Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation","volume":"22","author":"Ullah","year":"2022","journal-title":"Sensors"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0305-9006(88)90012-8","article-title":"Multi-criteria decision making (MCDM) techniques in planning","volume":"30","author":"Massam","year":"1988","journal-title":"Prog Plann"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/info10010004","article-title":"Multiple-criteria decision-making (MCDM) techniques for business processes information management","volume":"10","author":"Kazimieras Zavadskas","year":"2018","journal-title":"Information"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"25","DOI":"10.31181\/dma1120237","article-title":"A comprehensive review of multiple criteria decision-making (MCDM) methods: advancements, applications, and future directions","volume":"1","author":"Sahoo","year":"2023","journal-title":"Decis Mak Adv"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1016\/j.rser.2016.11.191","article-title":"A review of multi criteria decision making (MCDM) towards sustainable renewable energy development","volume":"69","author":"Kumar","year":"2017","journal-title":"Renew Sustain Energ Rev"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1007\/s40815-018-0499-y","article-title":"Multi-criteria decision-making methods in bipolar fuzzy environment","volume":"20","author":"Alghamdi","year":"2018","journal-title":"Int J Fuzzy Syst"},{"key":"ref15","first-page":"771","article-title":"Multi-criteria decision making based on bipolar picture fuzzy operators and new distance measures","volume":"127","author":"Riaz","year":"2021","journal-title":"Comput Model Eng Sci"},{"key":"ref16","first-page":"3373","article-title":"Cubic bipolar fuzzy Dombi averaging aggregation operators with application to multi-criteria decision-making","volume":"41","author":"Riaz","year":"2021","journal-title":"J Intell Fuzzy Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"72","DOI":"10.31181\/sor21202511","article-title":"An extension of VIKOR approach for MCDM using bipolar fuzzy preference \u03b4-covering based bipolar fuzzy rough set model","volume":"2","author":"Gul","year":"2025","journal-title":"Spec Oper Res"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-981-97-5734-3_11","article-title":"Applications of multi criteria decision making methods in cyber security","author":"Bhol","year":"2025","journal-title":"Cyber-physical systems security. Studies in big data. Vol. 154"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"113","DOI":"10.31181\/sor21202514","article-title":"Fairly aggregation operators based on complex p, q-rung orthopair fuzzy sets and their application in decision-making problems","volume":"2","author":"Ali","year":"2025","journal-title":"Spect Oper Res"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"178","DOI":"10.31181\/sdmap21202524","article-title":"A comprehensive and systematic review of multi-criteria decision-making (MCDM) methods to solve decision-making problems: two decades from 2004 to 2024","volume":"2","author":"Kumar","year":"2025","journal-title":"Spectr Decis Mak Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"80","DOI":"10.31181\/jdaic10006062023a","article-title":"An approach to multi-attribute decision-making based on intuitionistic fuzzy soft information and Aczel-Alsina operational laws","volume":"3","author":"Ali","year":"2023","journal-title":"J Decis Anal Intell Comput"},{"key":"ref22","first-page":"1","article-title":"Selection of optimal encryption algorithm based on hesitant bipolar complex fuzzy frank aggregation operators","volume":"71","author":"Mahmood","year":"2024","journal-title":"J Appl Math Comput"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"35417","DOI":"10.1109\/ACCESS.2024.3369893","article-title":"Selection of cloud services provider by utilizing multi-attribute decision-making based on hesitant bipolar complex fuzzy dombi aggregation operators","volume":"12","author":"Aslam","year":"2024","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"123127","DOI":"10.1109\/ACCESS.2024.3436687","article-title":"Selection of cloud security by employing mabac technique in the environment of hesitant bipolar complex fuzzy information","volume":"12","author":"Waqas","year":"2024","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s41066-018-0118-1","article-title":"Hesitant bipolar-valued fuzzy sets and bipolar-valued hesitant fuzzy sets and their applications in multi-attribute group decision making","volume":"4","author":"Mandal","year":"2019","journal-title":"Granul Comput"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/BF02189866","volume":"19","author":"Frank","year":"1979","journal-title":"Aequationes Math"},{"key":"ref27","first-page":"15","article-title":"Fuzzy generalized hybrid aggregation operators and its application in fuzzy decision making","volume":"12","author":"Merigo","year":"2010","journal-title":"Int J Fuzzy Syst"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.asoc.2014.10.007","article-title":"Hesitant fuzzy Hamacher aggregation operators for multicriteria decision making","volume":"26","author":"Tan","year":"2015","journal-title":"Appl Soft Comput"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1007\/s12652-018-1076-9","article-title":"Bipolar fuzzy Dombi aggregation operators and its application in multiple-attribute decision-making process","volume":"10","author":"Jana","year":"2019","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"103801","DOI":"10.1016\/j.compind.2022.103801","article-title":"Secure intelligent fuzzy blockchain framework: effective threat detection in iot networks","volume":"144","author":"Yazdinejad","year":"2023","journal-title":"Comput Ind"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.neucom.2022.12.027","article-title":"An optimized fuzzy deep learning model for data classification based on NSGA-II","volume":"522","author":"Yazdinejad","year":"2023","journal-title":"Neurocomputing"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65011\/TSP_CMC_65011.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:24Z","timestamp":1776923124000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065011","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}