Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The generations of cyber security attacks.

More »

Fig 1 Expand

Table 1.

Comparative analysis of related works.

More »

Table 1 Expand

Fig 2.

Hierarchy for the evaluation.

More »

Fig 2 Expand

Table 2.

Factors, sub-factors, and descriptions for evaluation of intrusion detection methods.

More »

Table 2 Expand

Fig 3.

Fuzzy AHP-TOPSIS approach.

More »

Fig 3 Expand

Fig 4.

Degree of satisfaction for CC-i.

More »

Fig 4 Expand

Table 3.

Consolidated fuzzy pairwise comparison matrix.

More »

Table 3 Expand

Table 4.

Consolidated fuzzy pairwise comparison matrix for M1 of second level.

More »

Table 4 Expand

Table 5.

Consolidated fuzzy pairwise comparison matrix for M2 of second level.

More »

Table 5 Expand

Table 6.

Integrated fuzzy pairwise comparison matrix for M3 of second level.

More »

Table 6 Expand

Table 7.

Consolidated fuzzy pairwise comparison matrix for M4 of second level.

More »

Table 7 Expand

Table 8.

Integrated pairwise comparison matrix at level 1.

More »

Table 8 Expand

Table 9.

Aggregated pair-wise comparison matrix at level 2 for M1.

More »

Table 9 Expand

Table 10.

Aggregated pair-wise comparison matrix at level 2 for M2.

More »

Table 10 Expand

Table 11.

Aggregated pair-wise comparison matrix at level 2 for M3.

More »

Table 11 Expand

Table 12.

Aggregated pair-wise comparison matrix at level 2 for M4.

More »

Table 12 Expand

Table 13.

Summarizing the outcomes.

More »

Table 13 Expand

Table 14.

Evaluator’s subjective cognitive results described in linguistic terms.

More »

Table 14 Expand

Table 15.

The standardized fuzzy decision matrix.

More »

Table 15 Expand

Table 16.

The weighted standardized fuzzy decision matrix.

More »

Table 16 Expand

Table 17.

Proximity coefficients to the desired level across various alternatives.

More »

Table 17 Expand

Fig 5.

Contrasting the outcomes of traditional and fuzzy AHP-TOPSIS approaches.

More »

Fig 5 Expand

Table 18.

Contrasting the outcomes of classical and fuzzy AHP-TOPSIS approaches.

More »

Table 18 Expand

Fig 6.

Graphical representation of sensitivity analysis.

More »

Fig 6 Expand

Table 19.

Statistical insights from sensitivity analysis.

More »

Table 19 Expand