Visible to the public Biblio

Found 103 results

Filters: Keyword is Fuzzy logic  [Clear All Filters]
2023-09-20
Dhalaria, Meghna, Gandotra, Ekta.  2022.  Android Malware Risk Evaluation Using Fuzzy Logic. 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC). :341—345.
The static and dynamic malware analysis are used by industrialists and academics to understand malware capabilities and threat level. The antimalware industries calculate malware threat levels using different techniques which involve human involvement and a large number of resources and analysts. As malware complexity, velocity and volume increase, it becomes impossible to allocate so many resources. Due to this reason, it is projected that the number of malware apps will continue to rise, and that more devices will be targeted in order to commit various sorts of cybercrime. It is therefore necessary to develop techniques that can calculate the damage or threat posed by malware automatically as soon as it is identified. In this way, early warnings about zero-day (unknown) malware can assist in allocating resources for carrying out a close analysis of it as soon as it is identified. In this paper, a fuzzy modelling approach is described for calculating the potential risk of malicious programs through static malware analysis.
2023-07-31
Islamy, Chaidir Chalaf, Ahmad, Tohari, Ijtihadie, Royyana Muslim.  2022.  Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error. 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). :137—142.
Transmitting data through the internet may have severe security risks due to illegal access done by attackers. Some methods have been introduced to overcome this issue, such as cryptography and steganography. Nevertheless, some problems still arise, such as the quality of the stego data. Specifically, it happens if the stego is shared with some users. In this research, a shared-secret mechanism is combined with steganography. For this purpose, the fuzzy logic edge detection and Prediction Error (PE) methods are utilized to hide private data. The secret sharing process is carried out after data embedding in the cover image. This sharing mechanism is performed on image pixels that have been converted to PE values. Various Peak Signal to Noise Ratio (PSNR) values are obtained from the experiment. It is found that the number of participants and the threshold do not significantly affect the image quality of the shares.
Abdaoui, Abderrazak, Erbad, Aiman, Al-Ali, Abdulla Khalid, Mohamed, Amr, Guizani, Mohsen.  2022.  Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet of Things Journal. 9:9987—9998.
The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy, and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for IoT systems. In this article, in order to improve the authentication and the encryption in IoT systems, we present a novel method of authentication and encryption based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. We evaluate our novel key generation method by using standard randomness tests, such as: frequency test, frequency test with mono block, run test, discrete Fourier transform (DFT) test, and advanced DFT test. Our results show superior performance compared to existing ECC based on shift registers. In addition, we apply some attack algorithms, such as Pollard’s \textbackslashrho and Baby-step Giant-step, to evaluate the vulnerability of the proposed scheme.
2023-07-28
Bhande, Sapana A, Chandrakar, V. K..  2022.  Fuzzy Logic based Static Synchronous Series Compensator (SSSC) to enhance Power System Security. 2022 IEEE IAS Global Conference on Emerging Technologies (GlobConET). :667—672.
In today's power market, it's vital to keep electrical energy affordable to the vast majority of people while maintaining the highest degree of dependability. Due to which, the transmission network must operate beyond transfer limitations, generating congestion on transmission lines. These transmission line difficulties can be alleviated with the use of reactive power adjustment based on FACTS devices. Using a fuzzy tuned Static Synchronous Series Compensator [SSSC], this research proposes a novel method for calculating the effective damping oscillation control signals. The performance of the SSSC is compared to that of fuzzy logic-based controllers using PI controllers. According to the simulation results, the SSSC with fuzzy logic control effectively improves power flow under disrupted conditions
Hasan, Darwito, Haryadi Amran, Sudarsono, Amang.  2022.  Environmental Condition Monitoring and Decision Making System Using Fuzzy Logic Method. 2022 International Electronics Symposium (IES). :267—271.

Currently, air pollution is still a problem that requires special attention, especially in big cities. Air pollution can come from motor vehicle fumes, factory smoke or other particles. To overcome these problems, a system is made that can monitor environmental conditions in order to know the good and bad of air quality in an environment and is expected to be a solution to reduce air pollution that occurs. The system created will utilize the Wireless Sensor Network (WSN) combined with Waspmote Smart Environment PRO, so that later data will be obtained in the form of temperature, humidity, CO levels and CO2 levels. From the sensor data that has been processed on Waspmote, it will then be used as input for data processing using a fuzzy algorithm. The classification obtained from sensor data processing using fuzzy to monitor environmental conditions there are 5 classifications, namely Very Good, Good, Average, Bad and Dangerous. Later the data that has been collected will be distributed to Meshlium as a gateway and will be stored in the database. The process of sending information between one party to another needs to pay attention to the confidentiality of data and information. The final result of the implementation of this research is that the system is able to classify values using fuzzy algorithms and is able to secure text data that will be sent to the database via Meshlium, and is able to display data sent to the website in real time.

Ksibi, Sondes, JAIDI, Faouzi, BOUHOULA, Adel.  2022.  A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment. 2022 15th International Conference on Security of Information and Networks (SIN). :01—07.

One of the most challenging issues facing Internet of Medical Things (IoMT) cyber defense is the complexity of their ecosystem coupled with the development of cyber-attacks. Medical equipments lack built-in security and are increasingly becoming connected. Moving beyond traditional security solutions becomes a necessity to protect patients and organizations. In order to effectively deal with the security risks of networked medical devices in such a complex and heterogeneous system, we need to measure security risks and prioritize mitigation actions. In this context, we propose a Fuzzy AHP-based method to assess security attributes of connected medical devices and compare different device models against a selected profile with regards to the user requirements. The proposal aims to empower user security awareness to make well-educated decisions.

De La Croix, Ntivuguruzwa Jean, Islamy, Chaidir Chalaf, Ahmad, Tohari.  2022.  Secret Message Protection using Fuzzy Logic and Difference Expansion in Digital Images. 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON). :1—5.

Secrete message protection has become a focal point of the network security domain due to the problems of violating the network use policies and unauthorized access of the public network. These problems have led to data protection techniques such as cryptography, and steganography. Cryptography consists of encrypting secrete message to a ciphertext format and steganography consists of concealing the secrete message in codes that make up a digital file, such as an image, audio, and video. Steganography, which is different from cryptography, ensures hiding a secret message for secure transmission over the public network. This paper presents a steganographic approach using digital images for data hiding that aims to providing higher performance by combining fuzzy logic type I to pre-process the cover image and difference expansion techniques. The previous methods have used the original cover image to embed the secrete message. This paper provides a new method that first identifies the edges of a cover image and then proceeds with a difference expansion to embed the secrete message. The experimental results of this work identified an improvement of 10% of the existing method based on increased payload capacity and the visibility of the stego image.

Reddy, V. Nagi, Gayathri, T., Nyamathulla, S K, Shaik, Nazma Sultana.  2022.  Fuzzy Logic Based WSN with High Packet Success Rate and Security. 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET). :1—5.
Considering the evidence that conditions accept a considerable place in each of the structures, owing to limited assets available at each sensor center, it is a difficult problem. Vitality safety is the primary concern in many of the implementations in remote sensor hubs. This is critical as the improvement in the lifetime of the device depends primarily on restricting the usage of vitality in sensor hubs. The rationing and modification of the usage of vitality are of the most serious value in this context. In a remote sensor arrangement, the fundamental test is to schedule measurements for the least use of vitality. These classification frameworks are used to frame the classes in the structure and help efficiently use the strength that burdens out the lifespan of the network. Besides, the degree of the center was taken into account in this work considering the measurement of cluster span as an improvement to the existing methods. The crucial piece of leeway of this suggested approach on affair clustering using fuzzy logic is which can increase the lifespan of the system by reducing the problem area problem word.
Dubchak, Lesia, Vasylkiv, Nadiia, Turchenko, Iryna, Komar, Myroslav, Nadvynychna, Tetiana, Volner, Rudolf.  2022.  Access Distribution to the Evaluation System Based on Fuzzy Logic. 2022 12th International Conference on Advanced Computer Information Technologies (ACIT). :564—567.
In order to control users’ access to the information system, it is necessary to develop a security system that can work in real time and easily reconfigure. This problem can be solved using a fuzzy logic. In this paper the authors propose a fuzzy distribution system for access to the student assessment system, which takes into account the level of user access, identifier and the risk of attack during the request. This approach allows process fuzzy or incomplete information about the user and implement a sufficient level of confidential information protection.
Abu-Khadrah, Ahmed.  2022.  An Efficient Fuzzy Logic Modelling of TiN Coating Thickness. 2022 International Conference on Business Analytics for Technology and Security (ICBATS). :1—5.
In this paper, fuzzy logic was implemented as a proposed approach for modelling of Thickness as an output response of thin film layer in Titanium Nitrite (TiN). The layer was deposited using Physical Vapor Deposition (PVD) process that uses a sputtering technique to coat insert cutting tools with TiN. Central cubic design (CCD) was used for designing the optimal points of the experiment. In order to develop the fuzzy rules, the experimental data that collected by PVD was used. Triangular membership functions (Trimf) were used to develop the fuzzy prediction model. Residual error (e) and prediction accuracy (A) were used for validating the result of the proposed fuzzy model. The result of the developed fuzzy model with triangular membership function revealed that the average residual error of 0.2 is low and acceptable. Furthermore, the model obtained high prediction accuracy with 90.04%. The result revealed that the rule-based model of fuzzy logic could be an efficient approach to predict coatings layer thickness in the TiN.
Khunchai, Seree, Kruekaew, Adool, Getvongsa, Natthapong.  2022.  A Fuzzy Logic-Based System of Abnormal Behavior Detection Using PoseNet for Smart Security System. 2022 37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC). :912—915.
This paper aims to contribute towards creating ambient abnormal behavior detection for smart security system from real-time human pose estimation using fuzzy-based systems. Human poses from keypoint detected by pose estimation model are transformed to as angle positions of the axis between human bodies joints comparing to reference point in the axis x to deal with problem of the position change occurred when an individual move in the image. Also, the article attempts to resolve the problem of the ambiguity interpreting the poses with triangular fuzzy logic-based system that determines the detected individual behavior and compares to the poses previously learnt, trained, and recorded by the system. The experiment reveals that the accuracy of the system ranges between 90.75% (maximum) and 84% (minimum). This means that if the accuracy of the system at 85%. The system can be applied to guide future research for designing automatic visual human behavior detection systems.
Rajderkar, Vedashree.P., Chandrakar, Vinod K.  2022.  Enhancement of Power System Security by Fuzzy based Unified Power Flow Controller. 2022 2nd International Conference on Intelligent Technologies (CONIT). :1—4.
The paper presents the design of fuzzy logic controller based unified power flow controller (UPFC) to improve power system security performance during steady state as well as fault conditions. Fuzzy interference has been design with two inputs Vref and Vm for the shunt voltage source Converter and two inputs for Series Id, Idref, Iq, Iqref at the series voltage source converter location. The coordination of shunt and series VSC has been achieved by using fuzzy logic controller (FLC). The comparative performance of PI based UPFC and fuzzy based UPFC under abnormal condition has been validated in MATLB domain. The combination of fuzzy with a UPFC is tested on multi machine system in MATLAB domain. The results shows that the power system security enhancement as well as oscillations damping.
2023-07-21
Benfriha, Sihem, Labraoui, Nabila.  2022.  Insiders Detection in the Uncertain IoD using Fuzzy Logic. 2022 International Arab Conference on Information Technology (ACIT). :1—6.
Unmanned aerial vehicles (UAVs) and various network entities deployed on the ground can communicate with each other over the Internet of Drones (IoD), a network architecture designed expressly to allow communications between heterogenous entities. Drone technology has a wide range of uses, including on-demand package delivery, traffic and wild life surveillance, inspection of infrastructure and search, rescue and agriculture. However, IoD systems are vulnerable to numerous attacks, The main goal is to develop an all-encompassing security model that can be used to analyze security concerns in various UAV-based systems. With exceptional flexibility and increasing efficiency, trust management is a promising alternative to traditional detection methods. In a heterogeneous environment, it is also compatible with other security mechanisms. In this article, we present a fuzzy logic as an Insider Detection technique which calculate sensor data trust and assessing node behavior. To build confidence throughout the entire IoD, our proposal divides trust into two parts: Data trust and Node trust. This is in contrast to earlier models. Experimental results show that our solution is effective in terms of False positive ratio and Average of end-to-end delay.
Muhammad Nabi, Masooma, Shah, Munam Ali.  2022.  A Fuzzy Approach to Trust Management in Fog Computing. 2022 24th International Multitopic Conference (INMIC). :1—6.

The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.

2023-05-12
Wang, Pengbiao, Ren, Xuemei, Wang, Dengyun.  2022.  Nonlinear cyber-physical system security control under false data injection attack. 2022 41st Chinese Control Conference (CCC). :4311–4316.
We investigate the fuzzy adaptive compensation control problem for nonlinear cyber-physical system with false data injection attack over digital communication links. The fuzzy logic system is first introduced to approximate uncertain nonlinear functions. And the time-varying sliding mode surface is designed. Secondly, for the actual require-ment of data transmission, three uniform quantizers are designed to quantify system state and sliding mode surface and control input signal, respectively. Then, the adaptive fuzzy laws are designed, which can effectively compensate for FDI attack and the quantization errors. Furthermore, the system stability and the reachability of sliding surface are strictly guaranteed by using adaptive fuzzy laws. Finally, we use an example to verify the effectiveness of the method.
ISSN: 1934-1768
2023-01-05
Kayouh, Nabil, Dkhissi, Btissam.  2022.  A decision support system for evaluating the logistical risks in Supply chains based on RPN factors and multi criteria decision making approach. 2022 14th International Colloquium of Logistics and Supply Chain Management (LOGISTIQUA). :1—6.
Logistics risk assessment in the supply chain is considered as one of the important topics that has attracted the attention of researchers in recent years; Companies that struggle to manage their logistical risks by not putting in place resilient strategies to mitigate them, may suffer from significant financial losses; The automotive industry is a vital sector for the Moroccan economy, the year 2020, the added-value of the automotive industry in Morocco is higher than that of the fertilizer (Fathi, n.d.) [1], This sector is considered the first exporter of the country. Our study will focuses on the assessment of the pure logistical risks in the moroccan automotive industry. Our main objective for this study is to assess the logistical risks which will allow us to put in place proactive and predictive resilient strategies for their mitigation.
2022-12-09
M, Gayathri, Gomathy, C..  2022.  Fuzzy based Trusted Communication in Vehicular Ad hoc Network. 2022 2nd International Conference on Intelligent Technologies (CONIT). :1—4.
Vehicular Ad hoc Network (VANET) is an emerging technology that is used to provide communication between vehicle users. VANET provides communication between one vehicle node to another vehicle node, vehicle to the roadside unit, vehicle to pedestrian, and even vehicle to rail users. Communication between nodes should be very secure and confidential, Since VANET communicates through wireless mode, a malicious node may enter inside the communication zone to hack, inject false messages, and interrupt the communication. A strong protocol is necessary to detect malicious nodes and authenticate the VANET user to protect them from malicious attacks. In this paper, a fuzzy-based trust authentication scheme is used to detect malicious nodes with the Mamdani fuzzy Inference system. The parameter estimation, rules have been framed using MATLAB Mamdani Fuzzy Inference system to select a genuine node for data transmission.
2022-09-16
Hu, Xiaoyan, Li, Yuanxin.  2021.  Event-Triggered Adaptive Fuzzy Asymptotic Tracking Control for Single Link Robot Manipulator with Prescribed Performance. 2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC). :144—149.
In this paper, the adaptive event-triggered asymptotic tracking control with guaranteed performance for a single link robot manipulator (SLRM) system driven by the brush DC motor is studied. Fuzzy logic systems (FLS) is used to approximate unknown nonlinear functions. By introducing a finite time performance function (FTPF), the tracking error of the system can converge to the compact set of the origin in finite time. In addition, by introducing the smooth function and some positive integral functions, combined with the boundary estimation method and adaptive backstepping technique, the asymptotic tracking control of the system is realized. Meanwhile, event-triggered mechanism is introduced to reduce the network resources of the system. Finally, a practical example is given to prove the effectiveness of the theoretical research.
Abdaoui, Abderrazak, Erbad, Aiman, Al-Ali, Abdulla, Mohamed, Amr, Guizani, Mohsen.  2021.  A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT. 2021 IEEE Globecom Workshops (GC Wkshps). :1—6.

Emerging technologies change the qualities of modern healthcare by employing smart systems for patient monitoring. To well use the data surrounding the patient, tiny sensing devices and smart gateways are involved. These sensing systems have been used to collect and analyze the real-time data remotely in Internet of Medical Thinks (IoM). Since the patient sensed information is so sensitive, the security and privacy of medical data are becoming challenging problem in IoM. It is then important to ensure the security, privacy and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for the IoM. In this paper, in order to improve the authentication and communications in health care applications, we present a novel secure and anonymous authentication scheme. We will use elliptic curve cryptography (ECC) with random numbers generated by fuzzy logic. We simulate IoM scheme using network simulator 3 (NS3) and we employ optimized link state routing protocol (OLSR) algorithm and ECC at each node of the network. We apply some attack algorithms such as Pollard’s ρ and Baby-step Giant-step to evaluate the vulnerability of the proposed scheme.

Almseidin, Mohammad, Al-Sawwa, Jamil, Alkasassbeh, Mouhammd.  2021.  Anomaly-based Intrusion Detection System Using Fuzzy Logic. 2021 International Conference on Information Technology (ICIT). :290—295.
Recently, the Distributed Denial of Service (DDOS) attacks has been used for different aspects to denial the number of services for the end-users. Therefore, there is an urgent need to design an effective detection method against this type of attack. A fuzzy inference system offers the results in a more readable and understandable form. This paper introduces an anomaly-based Intrusion Detection (IDS) system using fuzzy logic. The fuzzy logic inference system implemented as a detection method for Distributed Denial of Service (DDOS) attacks. The suggested method was applied to an open-source DDOS dataset. Experimental results show that the anomaly-based Intrusion Detection system using fuzzy logic obtained the best result by utilizing the InfoGain features selection method besides the fuzzy inference system, the results were 91.1% for the true-positive rate and 0.006% for the false-positive rate.
Mukeshimana, C., Kupriyanov, M. S..  2021.  Adaptive Neuro-fuzzy System (ANFIS) of Information Interaction in Industrial Internet of Things Networks Taking into Account Load Balancing. 2021 II International Conference on Neural Networks and Neurotechnologies (NeuroNT). :43—46.
The main aim of the Internet of things is to improve the safety of the device through inter-Device communication (IDC). Various applications are emerging in Internet of things. Various aspects of Internet of things differ from Internet of things, especially the nodes have more velocity which causes the topology to change rapidly. The requirement of researches in the concept of Internet of things increases rapidly because Internet of things face many challenges on the security, protocols and technology. Despite the fact that the problem of organizing the interaction of IIoT devices has already attracted a lot of attention from many researchers, current research on routing in IIoT cannot effectively solve the problem of data exchange in a self-adaptive and self-organized way, because the number of connected devices is quite large. In this article, an adaptive neuro-fuzzy clustering algorithm is presented for the uniform distribution of load between interacting nodes. We synthesized fuzzy logic and neural network to balance the choice of the optimal number of cluster heads and uniform load distribution between sensors. Comparison is made with other load balancing methods in such wireless sensor networks.
Kozlov, Aleksandr, Noga, Nikolai.  2021.  Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems. 2021 14th International Conference Management of large-scale system development (MLSD). :1—5.
The proposed method allows us to determine the predicted value of the complex systems information security risk and its confidence interval using regression analysis and fuzzy logic in terms of the risk dependence on various factors: the value of resources, the level of threats, potential damage, the level of costs for creating and operating the system, the information resources control level.
Bolshakov, Alexander, Zhila, Anastasia.  2021.  Fuzzy Logic Data Protection Management. 2021 28th Conference of Open Innovations Association (FRUCT). :35—40.
This article discusses the problem of information security management in computer systems and describes the process of developing an algorithm that allows to determine measures to protect personal data. The organizational and technical measures formulated by the FSTEC are used as measures.
Simankov, Vladimir S., Buchatskiy, Pavel Yu., Shopin, Andrey V., Teploukhov, Semen V., Buchatskaya, Victoria V..  2021.  An Approach to Identifying the Type of Uncertainty of Initial Information Based on the Theory of Fuzzy Logic. 2021 XXIV International Conference on Soft Computing and Measurements (SCM). :150—153.
The article discusses an approach to identifying the uncertainty of initial information based on the theory of fuzzy logic. A system of criteria for initial information is proposed, calculated on the basis of the input sample, and characterizing the measure of uncertainty present in the system. The basic requirements for the choice of membership functions of the fuzzy inference system are indicated and the final integrated output membership function is obtained, which describes the type of uncertainty of the initial information.
2022-09-09
Mostafa, Abdelrahman Ibrahim, Rashed, Abdelrahman Mostafa, Alsherif, Yasmin Ashraf, Enien, Yomna Nagah, Kaoud, Menatalla, Mohib, Ahmed.  2021.  Supply Chain Risk Assessment Using Fuzzy Logic. 2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES). :246—251.
Business's strength arises from the strength of its supply chain. Therefore, a proper supply chain management is vital for business continuity. One of the most challenging parts of SCM is the contract negotiation, and one main aspect of the negotiation is to know the risk associated with each range of quantity agreed on. Currently Managers assess the quantity to be supplied based on a binary way of either full or 0 supply, This paper aims to assess the corresponding quantities risks of the suppliers on a multilayer basis. The proposed approach uses fuzzy logic as an artificial intelligence tool that would develop the verbal terms of managers into numbers to be dealt with. A company that produces fresh frozen vegetables and fruits in Egypt who faces the problem of getting the required quantities from the suppliers with a fulfilment rate of 33% was chosen to apply the proposed model. The model allowed the managers to have full view of risk in their supply chain effectively and decide their needed capacity as well as the negotiation terms with both suppliers and customers. Future work should be the use of more data in the fuzzy database and implement the proposed methodology in an another industry.