Approximate reasoning based on IFRS and DS theory with its application in threat assessment

Y Lu, X Lei, Z Zhou, Y Song - Ieee Access, 2020 - ieeexplore.ieee.org
… for threat assessment with degrees of belief and disbelief. Based on the threat assessment
rule base, we study the BPA determination algorithm in multi-stage threat assessment. The …

A multicriteria fuzzy approximate reasoning approach for risk assessment of dam safety

JR Ribas, JI Pérez-Díaz - Environmental Earth Sciences, 2019 - Springer
… This paper employs a fuzzy approximate reasoning for dam safety risk assessment, initially
… adopts linguistic variables in a two-stage risk assessment. In the first stage, we compute the …

A novel target threat assessment method based on three-way decisions under intuitionistic fuzzy multi-attribute decision making environment

Y Gao, D Li, H Zhong - Engineering Applications of Artificial Intelligence, 2020 - Elsevier
… Therefore, to solve the problems of traditional threat assessment methods, we introduce
three-way decisions on target threat assessment and solve them under intuitionistic fuzzy multi-…

Explaining the impact of source behaviour in evidential reasoning

P Kowalski, M Zocholl, AL Jousselme - Information Fusion, 2022 - Elsevier
… of explanations of evidential reasoning by means of sensitivity … to the challenging problem
of threat assessment to maritime … In Section 4, we present a model of assessment of threat to …

An extended fuzzy CPT-TODIM model based on possibility theory and its application to air target dynamic threat assessment

R Zhao, F Yang, L Ji - Ieee Access, 2022 - ieeexplore.ieee.org
… target threat assessment are considered; the air target threat indicator set is determined,
and the uncertainty of detection information in the process of target threat assessment is …

Mapping cyber threat intelligence to probabilistic attack graphs

A Gylling, M Ekstedt, Z Afzal… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Threat modelling is an excellent method of assessing the … Cyber Threat Intelligence (CTI)
is information that helps … by using CTI feeds of known threat actors to enrich ADGs under …

[HTML][HTML] A robust statistical framework for cyber-vulnerability prioritisation under partial information in threat intelligence

M Angelelli, S Arima, C Catalano, E Ciavolino - Expert Systems with …, 2024 - Elsevier
reasoning under uncertainty about cyber-vulnerabilities and their prioritisation. Specifically,
we take advantage of mid-quantile regression to deal with ordinal risk assessments, and we …

APT-Dt-KC: advanced persistent threat detection based on kill-chain model

M Panahnejad, M Mirabi - The Journal of Supercomputing, 2022 - Springer
… It is difficult to use traditional defense for detecting the advanced persistent threat attacks
and protect network information. The detection of advanced persistent threat attack is usually …

[HTML][HTML] A new model of interval-valued intuitionistic fuzzy weighted operators and their application in dynamic fusion target threat assessment

C Fan, Q Fu, Y Song, Y Lu, W Li, X Zhu - Entropy, 2022 - mdpi.com
… moment when conducting the threat assessment, ignoring the timing of target information,
making it difficult to obtain objective and comprehensive threat assessment results. Fourth, …

Threat assessment techniques in intelligent vehicles: A comparative survey

Y Li, K Li, Y Zheng, B Morys, S Pan… - IEEE Intelligent …, 2020 - ieeexplore.ieee.org
… for the threat assessment of … threat assessment with path planning of automated vehicle
[20]. Still, a comparative study that involves all types of critical metrics for threat assessment of in…