{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:46:56Z","timestamp":1776206816198,"version":"3.50.1"},"reference-count":101,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:00:00Z","timestamp":1582848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the advent of cloud computing and wireless sensor networks, the number of cyberattacks has rapidly increased. Therefore, the proportionate security of networks has become a challenge for organizations. Information security advisors of organizations face difficult and complex decisions in the evaluation and selection of information security controls that permit the defense of their resources and assets. Information security controls must be selected based on an appropriate level of security. However, their selection needs intensive investigation regarding vulnerabilities, risks, and threats prevailing in the organization as well as consideration of the implementation, mitigation, and budgetary constraints of the organization. The goal of this paper was to improve the information security control analysis method by proposing a formalized approach, i.e., fuzzy Analytical Hierarchy Process (AHP). This approach was used to prioritize and select the most relevant set of information security controls to satisfy the information security requirements of an organization. We argue that the prioritization of the information security controls using fuzzy AHP leads to an efficient and cost-effective assessment and evaluation of information security controls for an organization in order to select the most appropriate ones. The proposed formalized approach and prioritization processes are based on International Organization for Standardization and the International Electrotechnical Commission (ISO\/IEC) 27001:2013. But in practice, organizations may apply this approach to any information security baseline manual.<\/jats:p>","DOI":"10.3390\/s20051310","type":"journal-article","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T03:13:28Z","timestamp":1583205208000},"page":"1310","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2787-8334","authenticated-orcid":false,"given":"Muhammad Imran","family":"Tariq","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Technology, Superior University, Lahore 54000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1155-0991","authenticated-orcid":false,"given":"Shakeel","family":"Ahmed","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology (CCSIT), King Faisal University, Al-Ahsa 31982, Saudi Arabia"}]},{"given":"Nisar Ahmed","family":"Memon","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology (CCSIT), King Faisal University, Al-Ahsa 31982, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4703-5852","authenticated-orcid":false,"given":"Shahzadi","family":"Tayyaba","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Lahore, Punjab 54000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7776-2746","authenticated-orcid":false,"given":"Muhammad Waseem","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Physics (Electronics), Government College, University of Lahore, Punjab 54000, Pakistan"}]},{"given":"Mohsin","family":"Nazir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Lahore College for Women University, Punjab 54000, Pakistan"}]},{"given":"Akhtar","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Quaid-e-Awam University of Engineering, Science and Technology, Nawabshah 67480, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0885-1283","authenticated-orcid":false,"given":"Valentina Emilia","family":"Balas","sequence":"additional","affiliation":[{"name":"Department of Automation and Applied Software; Aurel Vlaicu University of Arad, 310130 Arad, Romania"}]},{"given":"Marius M.","family":"Balas","sequence":"additional","affiliation":[{"name":"Department of Automation and Applied Software; Aurel Vlaicu University of Arad, 310130 Arad, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ahmed, K., and Gregory, M. (2011, January 16\u201318). Integrating Wireless Sensor Networks with Cloud Computing. Proceedings of the 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, Beijing, China.","DOI":"10.1109\/MSN.2011.86"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Arroyo, P., Herrero, J.L., Su\u00e1rez, J.I., and Lozano, J. (2019). Wireless Sensor Network Combined with Cloud Computing for Air Quality Monitoring. Sensors, 19.","DOI":"10.3390\/s19030691"},{"key":"ref_3","first-page":"49","article-title":"Integration of wireless sensor networks and cloud computing","volume":"2","author":"Swathi","year":"2014","journal-title":"Int. J. Comput. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Mhatre, L., and Rai, N. (2017, January 10\u201311). Integration between wireless sensor and cloud. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058285"},{"key":"ref_5","unstructured":"Jassas, M. (2015). A Framework for Integrating Wireless Sensors and Cloud Computing. [Ph.D. Thesis, Ontario Tech University]."},{"key":"ref_6","unstructured":"Alharbe, N., Atkins, A.S., and Champion, J. (2015, January 22\u201327). Use of cloud computing with wireless sensor networks in an Internet of Things environment for a smart hospital network. Proceedings of the Seventh International Conference on eHealth, Telemedicine, and Social Medicine, Lisbon, Portugal."},{"key":"ref_7","first-page":"185","article-title":"Comparative study on Integration of Wireless Sensor Network With Cloud Computing","volume":"9","author":"Srivastava","year":"2018","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Shah, S.H., Khan, F.K., Ali, W., Khan, J., Hussain, S.S., Kabeer, K.F., Wajid, A., and Jamshed, K. (2013, January 2\u20139). A new framework to integrate wireless sensor networks with cloud computing. Proceedings of the 2013 IEEE Aerospace Conference, Big Sky, MT, USA.","DOI":"10.1109\/AERO.2013.6497359"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Tariq, M.I., Tayyaba, S., Rasheed, H., and Ashraf, M.W. (2017). Factors influencing the Cloud Computing adoption in Higher Education Institutions of Punjab, Pakistan, IEEE.","DOI":"10.1109\/C-CODE.2017.7918925"},{"key":"ref_10","first-page":"57","article-title":"Agent Based Information Security Threat Management Framework for Hybrid Cloud Computing","volume":"17","author":"Tariq","year":"2017","journal-title":"IJCSNS"},{"key":"ref_11","first-page":"23","article-title":"Risk Based NIST Effectiveness Analysis for Cloud Security","volume":"10","author":"Tariq","year":"2017","journal-title":"Bahria Univ. J. Inf. Commun. Technol. (BUJICT)"},{"key":"ref_12","first-page":"209","article-title":"Towards information security metrics framework for cloud computing","volume":"1","author":"Tariq","year":"2012","journal-title":"Int. J. Cloud Comput. Serv. Sci."},{"key":"ref_13","first-page":"1","article-title":"Analysis of the Effectiveness of Cloud Control Matrix for Hybrid Cloud Computing","volume":"11","author":"Tariq","year":"2018","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"ref_14","first-page":"406","article-title":"Agent Based Information Security Framework for Hybrid Cloud Computing","volume":"13","author":"Tariq","year":"2019","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Llanso, T., McNeil, M., and Noteboom, C. (2019, January 8\u201311). Multi-Criteria Selection of Capability-Based Cybersecurity Solutions. Proceedings of the 52nd Hawaii International Conference on System Sciences, Grand Wailea, Maui.","DOI":"10.24251\/HICSS.2019.879"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s40171-017-0157-5","article-title":"Prioritizing and ranking the big data information security risk spectrum","volume":"18","author":"Bharathi","year":"2017","journal-title":"Glob. J. Flex. Syst. Manag."},{"key":"ref_17","first-page":"24","article-title":"FUZZY AHP Methodology and its sole applications","volume":"8","author":"Patil","year":"2018","journal-title":"Int. J. Manag. Res. Rev."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.asoc.2014.11.050","article-title":"Evaluating teaching performance based on fuzzy AHP and comprehensive evaluation approach","volume":"28","author":"Chen","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"99273","DOI":"10.1109\/ACCESS.2019.2929169","article-title":"Predictive Variables for Agile Development Merging Cloud Computing Services","volume":"7","author":"Butt","year":"2019","journal-title":"IEEE Access"},{"key":"ref_20","first-page":"95","article-title":"SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework","volume":"1","author":"Tariq","year":"2013","journal-title":"Int. J. Comput. Netw. Commun. Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-46768-4_5","article-title":"Fuzzy Multiple Attribute Decision Making","volume":"Volume 375","author":"Chen","year":"1992","journal-title":"Lecture Notes in Economics and Mathematical Systems"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1016\/j.trd.2018.07.016","article-title":"Application of multi-criteria decision analysis methods for assessing walkability: A case study in Porto Alegre, Brazil","volume":"63","author":"Pasqual","year":"2018","journal-title":"Transp. Res. Part D Transp. Environ."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Saaty, T.L. (1988). What is the analytic hierarchy process?. Mathematical Models for Decision Support, Springer.","DOI":"10.13033\/isahp.y1988.042"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/j.eswa.2016.08.064","article-title":"A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications","volume":"65","author":"Kubler","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.techfore.2018.11.005","article-title":"Integrating sustainability into strategic decision-making: A fuzzy AHP method for the selection of relevant sustainability issues","volume":"139","author":"Calabrese","year":"2019","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.jclepro.2018.10.131","article-title":"An integrated MCDM approach considering demands-matching for reverse logistics","volume":"208","author":"Wang","year":"2019","journal-title":"J. Clean. Prod."},{"key":"ref_27","unstructured":"Perumal, B., Rajasekaran, P., and Ramalingam, H. (2012, January 26\u201328). WSN integrated cloud for automated telemedicine (ATM) based e-healthcare applications. Proceedings of the 4th International Conference on Bioinformatics and Biomedical Technology (IPCBEE\u201912), Shanxi, China."},{"key":"ref_28","unstructured":"Alcaraz, C., Najera, P., Lopez, J., and Roman, R. (2010, January 29). Wireless sensor networks and the internet of things: Do we need a complete integration?. Proceedings of the 1st International Workshop on the Security of the Internet of Things (SecIoT\u201910), Tokyo, Japan."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1016\/j.proeng.2012.07.302","article-title":"Wireless Sensor Network Applications: A Study in Environment Monitoring System","volume":"41","author":"Othman","year":"2012","journal-title":"Procedia Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"59","DOI":"10.5121\/ijcnc.2013.5505","article-title":"Towards Internet of Things (IOTS): Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing","volume":"5","author":"Piyare","year":"2013","journal-title":"Int. J. Comput. Netw. Commun."},{"key":"ref_31","unstructured":"Agrawal, A., and Kaushal, S. (, January September). A Study on Integration of Wireless Sensor Network and Cloud Computing: Requirements, Challenges and Solutions. Proceedings of the Sixth International Conference on Computer and Communication Technology, Allahabad, India."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Piyare, R., Park, S., Maeng, S.Y., Park, S.H., Oh, S.C., Gil Choi, S., Choi, H.S., and Lee, S.R. (201, January 14\u201316). Integrating Wireless Sensor Network into Cloud services for real-time data collection. Proceedings of the 2013 International Conference on ICT Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2013.6675470"},{"key":"ref_33","first-page":"917923-18","article-title":"A Survey on Sensor-Cloud: Architecture, Applications, and Approaches","volume":"9","author":"Ansari","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_34","unstructured":"Hassan, M.M., Song, B., and Huh, E.-N. (, January October). A framework of sensor-cloud integration opportunities and challenges. Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia-MUM \u201904; Association for Computing Machinery (ACM), New York, NY, USA."},{"key":"ref_35","first-page":"13","article-title":"Integration of sensor networks in cloud computing","volume":"78","author":"Manea","year":"2016","journal-title":"UPB Sci. Bull. Ser. C"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJSNET.2015.069874","article-title":"Data gathering architecture for temporary worksites based on a uniform deployment of wireless sensors","volume":"18","author":"Khoufi","year":"2015","journal-title":"Int. J. Sens. Networks"},{"key":"ref_37","unstructured":"Kurschl, W., and Beer, W. (2017, January 5\u20137). Combining cloud computing and wireless sensor networks. Proceedings of the 11th International Conference on Distributed Smart Cameras\u2014ICDSC 2017, Association for Computing Machinery (ACM), Stanford, CA, USA."},{"key":"ref_38","first-page":"804","article-title":"Integrating Wireless Sensor Networks with Cloud Computing and Emerging its platforms using Middleware Services","volume":"5","author":"Santhanam","year":"2018","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ahmed, K., and Alexandrov, V. (2011). Identity and Access Management in Cloud Computing. Guide to Security in SDN and NFV, Springer Science and Business Media LLC.","DOI":"10.1007\/978-1-4471-2236-4_6"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/S0167-4048(00)87829-3","article-title":"A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls","volume":"19","author":"Barnard","year":"2000","journal-title":"Comput. Secur."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0167-4048(03)00311-0","article-title":"A model for deriving information security control attribute profiles","volume":"22","author":"Solms","year":"2003","journal-title":"Comput. Secur."},{"key":"ref_42","first-page":"60","article-title":"Information security management best practice based on ISO\/IEC 17799","volume":"39","year":"2005","journal-title":"Inf. Manag. J. Prairie Village"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1080\/10580530701586136","article-title":"An Information Security Governance Framework","volume":"24","author":"Eloff","year":"2007","journal-title":"Inf. Syst. Manag."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.cose.2018.05.009","article-title":"ISCP: In-depth model for selecting critical security controls","volume":"77","author":"Fazea","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_45","first-page":"445","article-title":"The MOORA method and its application to privatization in a transition economy","volume":"35","author":"Brauers","year":"2006","journal-title":"Control Cybern."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","article-title":"How to make a decision: The analytic hierarchy process","volume":"48","author":"Saaty","year":"1990","journal-title":"Eur. J. Oper. Res."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1016\/j.eswa.2006.02.004","article-title":"Evaluating intertwined effects in e-learning programs: A novel hybrid MCDM model based on factor analysis and DEMATEL","volume":"32","author":"Tzeng","year":"2007","journal-title":"Expert Syst. Appl."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2475","DOI":"10.1016\/j.apm.2006.10.002","article-title":"Analytic network process in supplier selection: A case study in an electronic firm","volume":"31","author":"Gencer","year":"2007","journal-title":"Appl. Math. Model."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-642-48318-9_3","article-title":"Methods for Multiple Attribute Decision Making","volume":"Volume 186","author":"Hwang","year":"1981","journal-title":"Lecture Notes in Economics and Mathematical Systems"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Riantaphyllou, E. (2000). Multi-criteria decision making methods. Multi-Criteria Decision Making Methods: A Comparative Study, Springer.","DOI":"10.1007\/978-1-4757-3157-6"},{"key":"ref_51","unstructured":"Garvey, P.R. (2008). Analytical Methods for Risk Management: A Systems Engineering Perspective, Chapman and Hall\/CRC."},{"key":"ref_52","first-page":"67","article-title":"Application of Preference Ranking Organization Method for Enrichment Evaluation Method in Energy Planning\u2014Regional Level 16","volume":"10","author":"Firouzabadi","year":"2013","journal-title":"Iran. J. Fuzzy Syst."},{"key":"ref_53","first-page":"103","article-title":"Multi-Criteria Decision Making in Civil Engineering: Part I\u2013 A State-of-the-Art Survey","volume":"7","author":"Zavadskas","year":"2016","journal-title":"Eng. Struct. Technol."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/S0377-2217(03)00020-1","article-title":"Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS","volume":"156","author":"Opricovic","year":"2004","journal-title":"Eur. J. Oper. Res."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.ejor.2006.01.020","article-title":"Extended VIKOR method in comparison with outranking methods","volume":"178","author":"Opricovic","year":"2007","journal-title":"Eur. J. Oper. Res."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"7745","DOI":"10.1016\/j.eswa.2010.04.066","article-title":"A performance evaluation model by integrating fuzzy AHP and fuzzy TOPSIS methods","volume":"37","author":"Sun","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0165-0114(97)00377-1","article-title":"Extensions of the TOPSIS for group decision-making under fuzzy environment","volume":"114","author":"Chen","year":"2000","journal-title":"Fuzzy Sets Syst."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.im.2013.05.008","article-title":"A hybrid fuzzy group ANP\u2013TOPSIS framework for assessment of e-government readiness from a CiRM perspective","volume":"50","author":"Tavana","year":"2013","journal-title":"Inf. Manag."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.jenvman.2015.09.028","article-title":"Application of TOPSIS and VIKOR improved versions in a multi criteria decision analysis to develop an optimized municipal solid waste management model","volume":"166","author":"Mir","year":"2016","journal-title":"J. Environ. Manag."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"26","DOI":"10.2174\/1874110X01206010026","article-title":"Fuzzy Multi-Criteria Decision-Making for Information Security Risk Assessment","volume":"6","year":"2012","journal-title":"Open Cybern. Syst. J."},{"key":"ref_61","first-page":"194","article-title":"A Decision Making Model of Influencing Behavior in Information Security","volume":"Volume 8721","author":"Yevseyeva","year":"2014","journal-title":"Formal Aspects of Component Software"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"5","DOI":"10.4304\/jsw.5.10.1162-1169","article-title":"The Use of AHP in Security Policy Decision Making: An Open Office Calc Application","volume":"5","author":"Syamsuddin","year":"2010","journal-title":"J. Softw."},{"key":"ref_63","first-page":"3","article-title":"Designing of Multi Criteria Decision Making Model for Improve Ranking of Information Security Risks","volume":"2","author":"Gharaee","year":"2015","journal-title":"Signal Data Process."},{"key":"ref_64","first-page":"13","article-title":"Information Security Management: ANP Based Approach for Risk Analysis and Decision Making","volume":"8","author":"Dse","year":"2016","journal-title":"Agris Line Pap. Econ. Inform."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Sendi, A.S., Jabbarifar, M., Shajari, M., and Dagenais, M. (2010, January 9\u201315). FEMRA: Fuzzy Expert Model for Risk Assessment. Proceedings of the 2010 Fifth International Conference on Internet Monitoring and Protection, Barcelona, Spain.","DOI":"10.1109\/ICIMP.2010.15"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Zhao, D.M., Wang, J.H., and Ma, J.F. (2006, January 13\u201316). Fuzzy Risk Assessment of the Network Security. Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China.","DOI":"10.1109\/ICMLC.2006.259092"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1111\/risa.12891","article-title":"Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management","volume":"40","author":"Ganin","year":"2017","journal-title":"Risk Anal."},{"key":"ref_68","first-page":"8001","article-title":"Information Security Risk Assessment: Bayesian Prioritization for AHP Group Decision Making","volume":"8","author":"Celikoglu","year":"2012","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_69","unstructured":"Xinlan, Z., Zhifang, H., Guangfu, W., and Xin, Z. (2010, January 19\u201320). Information Security Risk Assessment Methodology Research: Group Decision Making and Analytic Hierarchy Process. Proceedings of the 2010 Second world congress on software engineering, Wuhan, China."},{"key":"ref_70","unstructured":"Ejnioui, A., Otero, A.R., Tejay, G., Otero, C., and Qureshi, A. (2012, January 16\u201319). A Multi-attribute Evaluation of Information Security Controls in Organizations Using Grey Systems Theory. Proceedings of the Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Las Vegas, LA, USA."},{"key":"ref_71","unstructured":"Guan, B.-C., Lo, C.-C., Wang, P., and Hwang, J.-S. (2004, January 4\u20136). Evaluation of information security related risks of an organization\u2014The application of the multi-criteria decision-making method. Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, Taiwan."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s00521-018-3648-1","article-title":"Solving cloud vendor selection problem using intuitionistic fuzzy decision framework","volume":"32","author":"Krishankumar","year":"2020","journal-title":"Neural Computing and Applications"},{"key":"ref_73","first-page":"59","article-title":"Selecting Cloud Deployment Model Using a Delphi Analytic Hierarchy Process (DAHP)","volume":"3","author":"Ngeru","year":"2015","journal-title":"Ind. Syst. Eng. Rev."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Bangui, H., Ge, M., Buhnova, B., Rakrak, S., Raghay, S., and Pitner, T. (2017). Multi-Criteria Decision Analysis Methods in the Mobile Cloud Offloading Paradigm. J. Sens. Actuator Netw., 6.","DOI":"10.3390\/jsan6040025"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"4701","DOI":"10.1007\/s00500-018-3120-2","article-title":"SELCLOUD: A hybrid multi-criteria decision-making model for selection of cloud services","volume":"23","author":"Jatoth","year":"2018","journal-title":"Soft Comput."},{"key":"ref_76","first-page":"1","article-title":"Trustworthy Cloud Service Provider Selection using Multi Criteria Decision Making Methods","volume":"24","author":"Supriya","year":"2016","journal-title":"Eng. Lett."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Yazir, Y.O., Matthews, C., Farahbod, R., Neville, S., Guitouni, A., Ganti, S., Coady, Y., and Yaz\u0131r, Y.O. (2010, January 5\u201310). Dynamic Resource Allocation in Computing Clouds Using Distributed Multiple Criteria Decision Analysis. Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA.","DOI":"10.1109\/CLOUD.2010.66"},{"key":"ref_78","first-page":"1","article-title":"Comparison of Multi Criteria Decision Making Algorithms for Ranking Cloud Renderfarm Services","volume":"9","author":"Annette","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1002\/spe.2469","article-title":"Multi-criteria IoT resource discovery: A comparative analysis","volume":"47","author":"Nunes","year":"2016","journal-title":"Softw. Pr. Exp."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/978-981-10-7871-2_37","article-title":"Task Scheduling Mechanism Using Multi-criteria Decision-making Technique, MACBETH in Cloud Computing","volume":"Volume 710","author":"Nayak","year":"2018","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"ref_81","first-page":"1","article-title":"A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features","volume":"2","author":"Otero","year":"2010","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.accinf.2015.06.001","article-title":"An information security control assessment methodology for organizations\u2019 financial information","volume":"18","author":"Otero","year":"2015","journal-title":"Int. J. Account. Inf. Syst."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1080\/12460125.2018.1468177","article-title":"Decision support for selecting information security controls","volume":"27","author":"Almeida","year":"2018","journal-title":"J. Decis. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1016\/j.proeng.2017.04.427","article-title":"Evaluation of a Security Control Lane with the Application of Fuzzy Logic","volume":"187","author":"Kierzkowski","year":"2017","journal-title":"Procedia Eng."},{"key":"ref_85","unstructured":"Waxler, J. (2018). Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users. [Ph.D Thesis, The George Washington University]."},{"key":"ref_86","first-page":"45","article-title":"Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis","volume":"8","author":"Jalayer","year":"2016","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10257-016-0306-y","article-title":"Ranking information security controls by using fuzzy analytic hierarchy process","volume":"15","author":"Khajouei","year":"2016","journal-title":"Inf. Syst. e-Business Manag."},{"key":"ref_88","unstructured":"Choo, K.K., Mubarak, S., and Mani, D. (2014, January 24\u201328). Selection of information security controls based on AHP and GRA. Proceedings of the 18th Pacific Asia Conference on Information Systems, China."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1016\/j.procs.2016.09.261","article-title":"Two-stage Security Controls Selection","volume":"100","author":"Yevseyeva","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Le\u015bniak, A., Kubek, D., Plebankiewicz, E., Zima, K., and Belniak, S. (2018). Fuzzy AHP Application for Supporting Contractors\u2019 Bidding Decision. Symmetry, 10.","DOI":"10.3390\/sym10110642"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/S0377-2217(98)00331-2","article-title":"A discussion on Extent Analysis Method and applications of fuzzy AHP","volume":"116","author":"Zhu","year":"1999","journal-title":"Eur. J. Oper. Res."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Chou, Y.-C., Yen, H.-Y., Dang, V.T., and Sun, C.-C. (2019). Assessing the Human Resource in Science and Technology for Asian Countries: Application of Fuzzy AHP and Fuzzy TOPSIS. Symmetry, 11.","DOI":"10.3390\/sym11020251"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Diouf, M., and Kwak, C. (2018). Fuzzy AHP, DEA, and Managerial Analysis for Supplier Selection and Development; From the Perspective of Open Innovation. Sustainability, 10.","DOI":"10.3390\/su10103779"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Saha, O., Chakraborty, A., and Banerjee, J.S. (2018). A Fuzzy AHP Approach to IT-Based Stream Selection for Admission in Technical Institutions in India. Advances in Intelligent Systems and Computing, Springer Science and Business Media LLC.","DOI":"10.1007\/978-981-13-1951-8_75"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Aslanta\u015f, S., Tepe, S., and Merto\u011flu, B. (2019). A Fuzzy Based Risk Assessment Model with a Real Case Study, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-030-23756-1_109"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Fu, S., and Zhou, H. (2011, January 27\u201329). The information security risk assessment based on AHP and fuzzy comprehensive evaluation. Proceedings of the 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi\u2019an, China.","DOI":"10.1109\/ICCSN.2011.6014018"},{"key":"ref_97","first-page":"33","article-title":"Research on security risk assessment of information system based on improved fuzzy AHP","volume":"36","author":"Wang","year":"2011","journal-title":"Huoli yu Zhihui Kongzhi"},{"key":"ref_98","unstructured":"Zhao, D.-M., Wang, J.-H., Wu, J., and Ma, J.-F. (2005, January 18\u201321). Using Fuzzy Logic and Entropy Theory to Risk Assessment of the Information Security. Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Wang, J.-S., Liu, C.-H., and Lin, G.T. (2011, January 2\u201312). How to manage information security in cloud computing. Proceedings of the 2011 IEEE Conference on Systems, Man, and Cybernetics, Alaska, AK, USA.","DOI":"10.1109\/ICSMC.2011.6083866"},{"key":"ref_100","first-page":"151","article-title":"An AHP Model towards an Agile Enterprise","volume":"8","author":"Amine","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Otero, A., Tejay, G., Otero, L.D., and Ruiz-Torres, A. (2012, January 21\u201324). A fuzzy logic-based information security control assessment for organizations. Proceedings of the 2012 IEEE Conference on Open Systems, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICOS.2012.6417640"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/5\/1310\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:02:33Z","timestamp":1760173353000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/5\/1310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,28]]},"references-count":101,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["s20051310"],"URL":"https:\/\/doi.org\/10.3390\/s20051310","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,28]]}}}