Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    REVIEW

    A Review of Artificial Intelligence-Enhanced Fuzzy Multi-Criteria Decision-Making Approaches for Sustainable Transportation Planning

    Nezir Aydin1,2,*, Melike Cari3, Betul Kara3, Ertugrul Ayyildiz1,3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2625-2650, 2025, DOI:10.32604/cmc.2025.067290 - 23 September 2025

    Abstract Transportation systems are rapidly transforming in response to urbanization, sustainability challenges, and advances in digital technologies. This review synthesizes the intersection of artificial intelligence (AI), fuzzy logic, and multi-criteria decision-making (MCDM) in transportation research. A comprehensive literature search was conducted in the Scopus database, utilizing carefully selected AI, fuzzy, and MCDM keywords. Studies were rigorously screened according to explicit inclusion and exclusion criteria, resulting in 73 eligible publications spanning 2006–2025. The review protocol included transparent data extraction on methodological approaches, application domains, and geographic distribution. Key findings highlight the prevalence of hybrid fuzzy AHP and… More >

  • Open Access

    ARTICLE

    Multi-Agent Reinforcement Learning for Moving Target Defense Temporal Decision-Making Approach Based on Stackelberg-FlipIt Games

    Rongbo Sun, Jinlong Fei*, Yuefei Zhu, Zhongyu Guo

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3765-3786, 2025, DOI:10.32604/cmc.2025.064849 - 03 July 2025

    Abstract Moving Target Defense (MTD) necessitates scientifically effective decision-making methodologies for defensive technology implementation. While most MTD decision studies focus on accurately identifying optimal strategies, the issue of optimal defense timing remains underexplored. Current default approaches—periodic or overly frequent MTD triggers—lead to suboptimal trade-offs among system security, performance, and cost. The timing of MTD strategy activation critically impacts both defensive efficacy and operational overhead, yet existing frameworks inadequately address this temporal dimension. To bridge this gap, this paper proposes a Stackelberg-FlipIt game model that formalizes asymmetric cyber conflicts as alternating control over attack surfaces, thereby capturing More >

  • Open Access

    ARTICLE

    Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks: A Fuzzy Multi-Criteria Decision-Making Approach

    Ahmed Abbas Jasim Al-Hchaimi1, Yousif Raad Muhsen2,3,*, Wisam Hazim Gwad4, Entisar Soliman Alkayal5, Riyadh Rahef Nuiaa Al Ogaili6, Zaid Abdi Alkareem Alyasseri7,8, Alhamzah Alnoor9

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2661-2689, 2025, DOI:10.32604/cmes.2025.061318 - 03 March 2025

    Abstract The implementation of Countermeasure Techniques (CTs) in the context of Network-On-Chip (NoC) based Multiprocessor System-On-Chip (MPSoC) routers against the Flooding Denial-of-Service Attack (F-DoSA) falls under Multi-Criteria Decision-Making (MCDM) due to the three main concerns, called: traffic variations, multiple evaluation criteria-based traffic features, and prioritization NoC routers as an alternative. In this study, we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios. Consequently, an MCDM approach is essential to address these emerging challenges. While the recent MCDM approach has some issues, such as uncertainty, this… More >

  • Open Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935 - 15 May 2024

    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes… More >

  • Open Access

    ARTICLE

    Analyzing the Big Data Security Through a Unified Decision-Making Approach

    Abdulaziz Attaallah1, Hassan Alsuhabi2, Sarita Shukla3, Rajeev Kumar3,*, Bineet Kumar Gupta3, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1071-1088, 2022, DOI:10.32604/iasc.2022.022569 - 17 November 2021

    Abstract The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an… More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146 - 27 September 2021

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web… More >

  • Open Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124 - 28 December 2020

    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments,… More >

  • Open Access

    ARTICLE

    Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective

    Abdulaziz Attaallah1, Abdullah Algarni1, Raees Ahmad Khan2,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1849-1865, 2021, DOI:10.32604/cmc.2020.013854 - 26 November 2020

    Abstract The advanced technological need, exacerbated by the flexible time constraints, leads to several more design level unexplored vulnerabilities. Security is an extremely vital component in software development; we must take charge of security and therefore analysis of software security risk assumes utmost significance. In order to handle the cyber-security risk of the web application and protect individuals, information and properties effectively, one must consider what needs to be secured, what are the perceived threats and the protection of assets. Security preparation plans, implements, tracks, updates and consistently develops safety risk management activities. Risk management must… More >

  • Open Access

    ARTICLE

    A Multi-Objective Decision-Making Approach for the Optimal Location of Electric Vehicle Charging Facilities

    Weiwei Liu1, Yang Tang2, Fei Yang2, Yi Dou3, Jin Wang4,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 813-834, 2019, DOI:10.32604/cmc.2019.06754

    Abstract Electric vehicles (EVs) are recognized as one of the most promising technologies worldwide to address the fossil fuel energy resource crisis and environmental pollution. As the initial work of EV charging station (EVCS) construction, site selection plays a vital role in its whole life cycle. In this paper, a multi-objective optimization model for the location layout of EVCSs is established when considering various factors such as user demand, investment cost, soil locations, the emergency charging mileage limit, the actual road condition and service network reliability. The model takes the minimum investment cost and the minimum… More >

Displaying 1-10 on page 1 of 9. Per Page