2021
DOI: 10.3390/e23091112
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Cyber-Security and Cyber-Crimes in Oil and Gas Sectors Using the Innovative Structures of Complex Intuitionistic Fuzzy Relations

Abstract: Recently, there has been enormous development due to advancements in technology. Industries and enterprises are moving towards a digital system, and the oil and gas industries are no exception. There are several threats and risks in digital systems, which are controlled through cyber-security. For the first time in the theory of fuzzy sets, this research analyzes the relationships between cyber-security and cyber-crimes in the oil and gas sectors. The novel concepts of complex intuitionistic fuzzy relations (C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
10

Relationship

4
6

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 53 publications
0
8
0
Order By: Relevance
“…Yazdanbakhsh and Dick [ 26 ] reviewed the CFSs, Dick [ 27 ] studied the complex fuzzy logic, Nasir et al [ 28 31 ] proposed rich applications of complex fuzzy relations and its generalizations, Thirunavukarasu et al [ 32 ] proposed the applications of CFSs, Ngan et al [ 33 ] applied and represented the CIFS by quaternion numbers, Alkouri and Salleh [ 34 ] worked on complex IFRs (CIFRs), and Yaqoob et al [ 35 ] applied the CIFRs to cellular network provide companies. Jan et al [ 36 , 37 ] initiated the innovative concepts of CIFRs and IVCIFRs and proposed the applications of said concepts in the analysis of cyber-securities, cyber threats in petroleum sectors, and other industries. Lin et al [ 38 40 ] worked comprehensively on decision-making techniques in the environment of picture fuzzy information.…”
Section: Introductionmentioning
confidence: 99%
“…Yazdanbakhsh and Dick [ 26 ] reviewed the CFSs, Dick [ 27 ] studied the complex fuzzy logic, Nasir et al [ 28 31 ] proposed rich applications of complex fuzzy relations and its generalizations, Thirunavukarasu et al [ 32 ] proposed the applications of CFSs, Ngan et al [ 33 ] applied and represented the CIFS by quaternion numbers, Alkouri and Salleh [ 34 ] worked on complex IFRs (CIFRs), and Yaqoob et al [ 35 ] applied the CIFRs to cellular network provide companies. Jan et al [ 36 , 37 ] initiated the innovative concepts of CIFRs and IVCIFRs and proposed the applications of said concepts in the analysis of cyber-securities, cyber threats in petroleum sectors, and other industries. Lin et al [ 38 40 ] worked comprehensively on decision-making techniques in the environment of picture fuzzy information.…”
Section: Introductionmentioning
confidence: 99%
“…Liu et al [ 23 , 24 ] proposed the adaptive controller designs and adaptive fuzzy synchronization of uncertain fractional-order chaotic and nonlinear systems. Jan et al [ 25 ] studied cyber securities by using fuzzy modeling techniques. Xian et al [ 26 ] optimized the A ∗ algorithm by introducing three new methods of “guideline,” “key point list,” and “bidirectional search” to solve the storage space occupation problem of the A ∗ algorithm [ 26 ].…”
Section: Introductionmentioning
confidence: 99%
“…Yaqoob et al [16] used CIFSs in cellular network providers' corporations. Nasir et al [17][18][19] applied the CFSs, complex fuzzy relations (CFRs), and their generalizations to cybersecurity and network security. References [20][21][22] majorly worked on DM methods under the complex fuzzy information.…”
Section: Introductionmentioning
confidence: 99%