Author of the publication

Application of Fuzzy Logic in Computer Security and Forensics.

, , and . Computational Intelligence for Privacy and Security, volume 394 of Studies in Computational Intelligence, Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-dominance and attitudinal prioritisation methods for intuitionistic and interval-valued intuitionistic fuzzy preference relations., and . Expert Syst. Appl., 39 (18): 13409-13416 (2012)Managing incomplete preference relations in decision making: A review and future trends., , , and . Inf. Sci., (2015)Type-reduction of the discretised interval type-2 fuzzy set., , and . FUZZ-IEEE, page 738-743. IEEE, (2009)Fuzzy decision making and consensus: Challenges., , , , , and . Journal of Intelligent and Fuzzy Systems, 29 (3): 1109-1118 (2015)Attention-Based Deep Learning Model for Predicting Collaborations Between Different Research Affiliations., , , , , and . IEEE Access, (2019)The Collapsing Defuzzifier for discretised generalised type-2 fuzzy sets., and . Int. J. Approx. Reasoning, (2018)Consensus modeling with cost chance constraint under uncertainty opinions., , , and . Appl. Soft Comput., (2018)Biology migration algorithm: a new nature-inspired heuristic methodology for global optimization., , , , , and . Soft Comput., 23 (16): 7333-7358 (2019)On Constructing Parsimonious Type-2 Fuzzy Logic Systems via Influential Rule Selection., , , and . IEEE Trans. Fuzzy Systems, 17 (3): 654-667 (2009)Guest Editorial: Intelligent Decision Making and Consensus Under Uncertainty in Inconsistent and Dynamic Environments., , , , , and . Knowl.-Based Syst., (2018)