Skip to Content
BDCCBig Data and Cognitive Computing
  • Article
  • Open Access

4 November 2024

Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making

,
,
,
,
,
,
and
1
Artificial Intelligence Technology Scientific and Education Center, Bauman Moscow State Technical University, 105005 Moscow, Russia
2
Department of Information and Control Systems, Reshetnev Siberian State University of Science and Technology, 660037 Krasnoyarsk, Russia
3
Department of Data Analysis and Machine Learning, Financial University, 125167 Moscow, Russia
4
Department of Mathematics, Physics, Chemistry and Information Technologies, Belgorod State Agricultural University Named After V. Gorin, 308503 Belgorod, Russia

Abstract

In recent years, cybersecurity management has increasingly required advanced methodologies capable of handling complex, evolving threat landscapes. Scenario network-based approaches have emerged as effective strategies for managing uncertainty and adaptability in cybersecurity projects. This article introduces a scenario network-based approach for managing cybersecurity projects, utilizing fuzzy linguistic models and a Takagi–Sugeno–Kanga fuzzy neural network. Drawing upon L. Zadeh’s theory of linguistic variables, the methodology integrates expert analysis, linguistic variables, and a continuous genetic algorithm to predict membership function parameters. Fuzzy production rules are employed for decision-making, while the Mamdani fuzzy inference algorithm enhances interpretability. This approach enables multi-scenario planning and adaptability across multi-stage cybersecurity projects. Preliminary results from a research prototype of an intelligent expert system—designed to analyze project stages and adaptively construct project trajectories—suggest the proposed approach is effective. In computational experiments, the use of fuzzy procedures resulted in an over 25% reduction in errors compared to traditional methods, particularly in adjusting project scenarios from pessimistic to baseline projections. While promising, this approach requires further testing across diverse cybersecurity contexts. Future studies will aim to refine scenario adaptation and optimize system response in high-risk project environments.

1. Introduction

The rapid advancement of digital technologies has transformed not only the way businesses operate but also the landscape of cybersecurity. As organizations increasingly rely on digital solutions, they become more vulnerable to an evolving array of cyber threats. These threats range from sophisticated hacking attempts to insider risks, often resulting in significant financial and reputational damage. As reported in the literature, these emerging risks are accompanied by a growing need for robust cybersecurity measures that can adapt to the dynamic threat environment [1,2,3]. Furthermore, the fast-paced technological innovations present opportunities for enhancing cybersecurity practices, making it essential for organizations to remain vigilant and proactive in their defenses [4,5].
Given the complexities and high stakes involved, long-term cybersecurity projects require a flexible and adaptive management approach. This necessity arises from the fact that project conditions frequently change based on the outcomes of individual stages, emerging threats, and advancements in technology. Moreover, cybersecurity projects often entail substantial financial investments, particularly for small and medium-sized enterprises (SMEs), where the cost of implementing comprehensive security measures can be especially burdensome [6,7,8]. As a result, effective decision support mechanisms in adaptive project management for the development and implementation of cybersecurity systems become critically important, ensuring that resources are allocated efficiently and risks are managed effectively.
The complexity and unstructured nature of the cybersecurity domain further require the use of intelligent decision-making methods. Traditional approaches, such as the widely adopted precedent-based methodology, often encounter limitations due to the scarcity of historical data regarding the effectiveness of information security systems against new and emerging threats [9,10]. The lack of precedents complicates the ability of decision-makers to rely on past experiences when navigating the intricacies of cybersecurity project management. Therefore, there is a pressing need for innovative frameworks that can accommodate the unique challenges of this field.
The structure of this article is outlined as follows. It begins with Section 2, which reviews the existing literature and methodologies relevant to information security management, identifying gaps and opportunities for enhancement. Following this, Section 3 outlines various frameworks and approaches that organizations can adopt to evaluate and improve their cybersecurity strategies. This is succeeded by Section 4, which analyzes the findings from the research, addressing their implications for practitioners and policy-makers in the field. Next, Section 5 considers how expert opinions may evolve over time and the potential impacts of these changes on decision-making processes. This leads to Section 6, where methods for navigating project stages and making informed decisions based on dynamic circumstances are proposed. The article concludes with a summary of key insights and recommendations for future research in adaptive project management for cybersecurity.

3. Models and Methods for Assessing Information Security Management in Organizations

In line with the concept of performance management (also known as results-oriented management) [22], we define the goal of a cybersecurity project as achieving specific, planned values for the organization’s information security management indicators. Thus, the project’s indicative information model can be represented as a series of project indicators C across all stages t i , i = 1 , 2 , , I , of the project’s implementation:
M = C ( t i ) , i = 1 , 2 , , I
In alignment with the framework provided in [23], cybersecurity indicators are considered to address key tasks in secure information management. These tasks include the structured assignment and distribution of roles to support trust among personnel and the establishment of effective access control and registration management processes [24]. To mitigate malware and cyber threats, antivirus protection tools are emphasized alongside the responsible use of internet resources [25]. Cryptographic protection for information is implemented to ensure data integrity and confidentiality. Furthermore, the secure execution of information technology processes is supported by comprehensive document management protocols [26]. Lastly, particular attention is given to the handling of personal data, thereby safeguarding privacy and ensuring regulatory compliance.
The assessment of an organization’s information security management is determined by a hierarchy of group and individual indicators, as illustrated in Figure 1, which allows the evaluation of compliance with cybersecurity requirements across the following areas (denoted by a symbol with one index) and subdomains (denoted by a symbol with two indices, where the first reflects the area):
Figure 1. Hierarchical representation of security management metrics.
The framework for cybersecurity management is structured around three core components: the overall organization of the information security service (C1) [27], risk analysis and breach management (C2) [28], and ongoing system analysis and modernization (C3) [29].
The C1 component covers the foundational aspects of information security, focusing on the establishment and operation of the security service. It includes the organization and operational guidelines for the information security team (C1.1) and the precise definition and adjustment of the security system’s scope (C1.2). Internal documents governing security activities are developed and updated as needed (C1.3), supporting decision-making processes led by management regarding system implementation and operation (C1.4). Finally, this component emphasizes the importance of staff training and awareness programs to reinforce information [30] security protocols (C1.5).
Risk assessment and management for potential security breaches fall under the C2 component. It begins with selecting and refining approaches for assessing risks (C2.1) and progresses to the development (C2.2) and implementation (C2.3) of detailed risk management plans. Additionally, this component encompasses the detection and response to security incidents (C2.4) as well as continuity planning to ensure the organization’s operational resilience and recovery capabilities after disruptions (C2.5), which is relevant not only for cybersecurity incidents but also for other types of disruptions. This broader applicability aligns with C1.1.11 and suggests the need for a more flexible structure, such as a directed acyclic craph (DAG), to effectively represent the interdependencies within continuity and recovery planning
Continuous improvement in and assessment of the security system define the C3 component. Routine monitoring and control of security measures are prioritized (C3.1), along with internal (C3.2) and external audits (C3.3) for evaluating system integrity. Performance is periodically reviewed (C3.4), supplemented by management reviews to ensure alignment with strategic goals (C3.5). Decision-making is conducted on both tactical (C3.6) and strategic (C3.7) levels to guide immediate and long-term improvements, ensuring the system evolves with emerging cybersecurity needs.
Within this hierarchy, each two-level indicator corresponds to a group of primary three-level indicators, which are derived from expert evaluations. For instance, the indicator C1.1 encompasses several three-level indicators, each reflecting different aspects of the organization and functioning of the information security service, as detailed below:
The C1.1 standards outline essential conditions for the effective operation and governance of an organization’s information security service. These begin with ensuring the security team has sufficient personnel capable of implementing, operating, controlling, and maintaining the information security system effectively (C1.1.1), complemented by the adequacy of resources required to achieve defined security goals and objectives (C1.1.2). A dedicated budget is critical for supporting the operational and strategic needs of the service (C1.1.3).
The authority of the information security service plays a crucial role, enabling it to organize, prepare, and control the execution of security plans (C1.1.4). Additionally, the service must hold the right to propose necessary modifications to the organization’s overall security policy (C1.1.5) and implement changes to internal documents governing security protocols (C1.1.6). Setting security requirements across the organization falls under its purview (C1.1.7), as does ensuring compliance with these policies, especially for employees with elevated access privileges (C1.1.8).
The information security service must also be empowered to monitor security-related events (C1.1.9) and participate actively in investigating incidents, including recommending sanctions for unauthorized actions (C1.1.10). In the event of disruptions, the service plays a critical role in restoring information systems (C1.1.11) and contributes to the ongoing creation, maintenance, and enhancement of the organization’s security systems (C1.1.12).
The values of the three-level indicators (e.g., C1.1.1–C1.1.12) are determined on a scale from 0 to 1 based on expert surveys. Each expert evaluates these indicators according to the following set of values: {0; 0.25; 0.5; 0.75; 1.0}, as shown in Table 2. The numerical values reflect the expert’s judgment on various aspects of the organization’s information security performance.
Table 2. Correspondence between numerical indicator values and expert judgments.
If there are several experts (denoted as N, which is preferred), the complete set of experts, E x = { e x n , n = 1 , 2 , , N } , is divided into disjoint classes, E x j , j = 1 , 2 , , J . Each class is assigned a weighting coefficient w j , reflecting the relative importance of the judgments from the experts in that class, where w is a probability vector.
The following conditions for weight coefficients are satisfied:
  • w j 0 , j = 1 , 2 , , J (non-negativity condition);
  • w 1 + w 2 + + w J = 1 (normalization condition).
The numerical value of an indicator is calculated as the weighted average of expert evaluations. For example, the value of indicator C 1.1 . 1 is determined by the formula
C 1.1 . 1 = j = 1 J n = 1 N v j n · w j · C 1.1 . 1 n
where C 1.1 . 1 n is the evaluation of indicator C 1.1 . 1 by expert e x n , and v j n is an indicator showing the membership of expert e x n to class E x j : v j n = 1 if e x n E x j , and v j n = 0 otherwise.
Transitioning from third-level (three-index) indicators to second-level (two-index) indicators involves summing over the last index, while maintaining weighted summation. The weighting coefficients correspond to the relative significance of the third-level indicators. For instance, the indicator for the organization and functioning of the information security service C 1.1 is calculated as
C 1.1 = j e E x j w e · C 1.1 . 1 e .
Here, C 1.1 . r is a third-level indicator related to C 1.1 ( r = 1 , 2 , , 12 ), and w 1.1 . r ( w 1.1 . r 0 ) is the corresponding weighting coefficient for C 1.1 . r . The following condition holds for the weighting coefficients, where w is a probability vector:
w 1.1 . 1 + w 1.1 . 2 + + w 1.1 . 12 = 1
The transition from second-level to first-level indicators also follows the weighted summation approach. For example, the overall organization of the information security service C 1 is determined by
C 1 = r = 1 5 w 1 . r · C 1 . r
where C 1 . r is a second-level indicator related to C 1 ( r = 1 , 2 , , 5 ), and w 1 . r ( w 1 . r 0 ) is the weighting coefficient for C 1 . r . The following condition applies:
w 1.1 + w 1.2 + + w 1.5 = 1
To determine the weight coefficients, standard methods for processing expert opinions can be used, such as ranking methods [31] or paired/multiple comparison methods [32].
In the following stages of the project, we will limit our analysis to a system of integral indicators C = C 1 , C 2 , C 3 , where the values are determined through a hierarchical transition based on expert evaluations.

4. Results and Discussion

4.1. Project Scenario Network

The project is modeled as a time-ordered sequence of cybersecurity management measures, each representing a stage in project implementation. At the conclusion of each stage (except the last), adaptive project management allows the subsequent set of measures to be selected based on the following:
  • The results of the current and several preceding stages;
  • A set of external factors affecting future project implementation.
Thus, the project is described as a scenario network (see Figure 2), which can be represented as a directed acyclic graph with one source (a vertex with zero in-degree) and one sink (a vertex with zero out-degree).
Figure 2. Graphical representation of the project’s scenario network (example).
Unlike activity-on-node networks [33], where nodes and edges represent events and actions, the following are the features of a scenario network:
  • The vertices of the network correspond to the project stages;
  • The arcs indicate the sequence of these stages;
  • The network source corresponds to the initial stage;
  • The network sink corresponds to the final stage.
The trajectory of the project is the path from the network’s source to the sink.

4.2. Fuzzy Linguistic Description of Project Indicators and External Factors

At the end of stage t, the project outcomes are described as
C ( t ) = C 1 ( t ) ,   C 2 ( t ) ,   C 3 ( t )
Along with these outcomes, we consider a system of external factors F A C T ( t , τ ) , which affect the implementation of the subsequent τ stages:
F A C T ( t , τ ) = F a c t k ( t + 1 ) ,   F a c t k ( t + 2 ) , , F a c t k ( t + τ )
where K ( k = 1 , 2 , , K ) represents the number of external factors. The influence of information security threats can also be considered among these factors, with numerical estimates derived from the approach in [34].
However, numerical values alone do not capture the significance of project indicators and external factors for future implementation. Experts can assess their significance verbally, using terms such as “Low”, “Medium”, and “High”. This leads to the introduction of linguistic variables for project indicators and external factors, defined as
L i n g C 1 ( t ) = N a m e C 1 ,   U n ,   T b a s e ,   G ,   M C 1 ( t )
L i n g F a c t k ( t ) = N a m e L i n g F a c t k ,   U n ,   T b a s e ,   G ,   M F a c t k ( t )
where t = 1 , 2 , , T and k = 1 , 2 , , K . Here, N a m e C 1 , N a m e L i n g F a c t k refer to the names of linguistic variables; U n = [ 0 , 1 ] represents the numerical values of the indicators and factors; T b a s e = { Low , Medium , High } defines the base term set; and G is a set of syntactic rules for generating terms. The membership functions for these terms may be trapezoidal (see Figure 3).
Figure 3. Membership functions μ L o w ,   μ M e d i u m ,   μ H i g h defining the semantics of linguistic variables L i n g C 1 ( t ) ,   L i n g C 2 ( t ) ,   L i n g F a c t k ( t ) for k = 1 , 2 , , K .
The semantics of these terms are determined by a vector of parameters:
P a r I n d T b a s e ( t ) = ( α 1 ( t ) ,   α 2 ( t ) , ,   α 8 ( t ) )
where α 1 ,   α 3 define the term “Low”; α 2 ,   α 4 ,   α 5 ,   α 7 define “Medium”; and α 6 ,   α 8 define “High”. These parameters vary for each linguistic variable L i n g C 1 ( t ) ,   L i n g F a c t k ( t ) .
For short-term projects, the parameter dependence on project stages can be neglected, assuming P a r I n d T b a s e remains constant. However, in long-term cybersecurity projects subject to significant instability, adapting the semantics of linguistic terms allows for more accurate descriptions and better-informed management decisions.

5. Accounting for Possible Changes in the Semantics of Verbal Expert Assessments

When utilizing verbal expert assessments for the intermediate results of long-term projects in the field of information security management, it is important to recognize that expert judgments about the levels of indicator values achieved throughout the project’s implementation largely depend on the general context associated with the specific phase of the project. Without loss of generality, we assume that these verbal expert assessments can take values from the following set:
T base = { L ( Low ) ,   M ( Medium ) ,   H ( High ) }
In the current landscape of information security, two major trends are highly relevant:
  • Increasing requirements for the level of information security in organizations (enterprises), driven by the rising integration of modern digital technologies into organizational and production activities, which in turn increases the potential damage caused by unauthorized access and other security breaches (TrendReq).
  • Advancements in the capability to ensure information security within organizations, linked to the development of both organizational legal measures and hardware/software solutions and their application technologies (TrendCap).
Consequently, the quantitative values of certain information security management indicators, initially rated as “High” by experts in the early stages of the project, may later be downgraded to “Medium” or even “Low” in subsequent stages. Thus, when planning projects in the field of information security management, a crucial task is forecasting changes in the semantics of basic terms, described by the vector function
ParIndT base ( t )
where t = 1 , 2 , , T represents the number of the project execution stage.
Given the high level of uncertainty typical of forecasting based on expert opinions, we propose using fuzzy [35] linguistic modeling to address this problem. We introduce linguistic variables LingTrendReq and LingTrendCap, analogous to LingC ( t ) and LingFact k ( t ) , but with term membership functions defined by a generalized Gaussian function:
μ ( x ) = 1 1 + r ( x β σ ) 2 γ
The set of parameters β , σ , γ varies for each basic term of the linguistic variables. The type of membership functions employed is shown in Figure 4.
Figure 4. Graphs of membership functions μ L , μ M , μ H , defining the semantics of the terms.
We assume that the relationship between TrendReq ( t ) , TrendCap ( t ) , and the values of α i ( t ) (for i = 1 , 2 , , 8 ) can be described by Sugeno’s fuzzy production rules with linear functions on the right-hand sides of the rules. These rules, in this case, have the following form:
IF ( TrendReq ( t ) = Low ,   TrendCap ( t ) = Low )
THEN α i L L ( t + 1 ) = α i L L ( t ) + β i L L ( t ) + γ i L L ( t ) TrendReq ( t ) + δ i L L ( t ) TrendCap ( t ) ;
IF ( TrendReq ( t ) = Low ,   TrendCap ( t ) = Medium )
THEN α i L M ( t + 1 ) = α i L M ( t ) + β i L M ( t ) + γ i L M ( t ) TrendReq ( t ) + δ i L M ( t ) TrendCap ( t ) ;
and so forth, for all possible combinations of TrendReq and TrendCap values. The index t runs from 1 to T 1 , and i = 1 , 2 , , 8 .
Using these relations, the values of α i s ( t ) (where s S = {LL, LM, LH, ML, MM, MH, HL, HM, HH}) are calculated. The parameters α i ( t ) are then found as weighted averages of these values, with the weights v i s ( t ) representing the degree of truth of the corresponding fuzzy production rules:
α i ( t ) = s S v i s ( t ) α i s ( t ) s S v i s ( t )
To determine the values of α i s ( t ) , a five-layer Takagi–Sugeno–Kang fuzzy neural network is constructed, as shown in Figure 5.
Figure 5. Five-layer Takagi–Sugeno–Kang fuzzy neural network for determining membership function parameters that define the semantics of linguistic variables LingC 1 ( t ) , LingC 2 ( t ) , LingC 3 ( t ) , and LingFact k ( t ) .
The inputs to this network are the current parameter values α i ( t ) , which determine the semantics of the terms at the current stage, along with numerical expert assessments of the trends TrendReq and TrendCap. The network operates as follows:
  • The first layer performs fuzzification by determining generalized Gaussian membership functions for the input values.
  • In the second layer, the left-hand sides of the fuzzy production rules are aggregated, calculating v i s , and the right-hand functions are computed to find α i s ;
  • The third layer calculates the product of α i s and v i s for all s S ;
  • The fourth layer sums the products α i s v i s and v i s over s S ;
  • The fifth layer outputs the next-stage parameter value α i ( t + 1 ) .
Training the network is achieved by finding the membership function parameters μ L ( x ) ,   μ M ( x ) ,   μ H ( x ) for the trend variables TrendReq and TrendCap, as well as the coefficients β i s ,   γ i s ,   δ i s for the production rules. The training is carried out using the continuous genetic algorithm (CGA) developed by Abo-Hammour [36], which can be optimized using advanced strategies such as hybrid tournament–roulette selection [37] and adaptive control of new generation formation [38].

6. Decision Support for Selecting a Subscenario in Project Implementation

Given the specifics of cybersecurity projects, we introduce simplifying assumptions to limit the class of graphical project descriptions under consideration:
  • Lim1: Equinitiality and equifinality (all scenarios have a common initial and final stage);
  • Lim2: Existence of a basic scenario (the main scenario is defined, and resources are calculated for its implementation; all other scenarios are treated as deviations from the basic scenario);
  • Lim3: Limited branching (branching stages are only part of the basic scenario);
  • Lim4: Limited merging (subscenarios starting from a branching stage must conclude at a stage in the basic scenario before the next branching);
  • Lim5: Limited subscenarios (each branching stage produces four types of subscenarios: optimistic, basic, pessimistic, and catastrophic).
A graphical representation of a fragment of the project’s structural model, considering these limitations (Lim1 to Lim5), shows the branching into optimistic (OS), basic (BS), pessimistic (PS), and catastrophic (CS) subscenarios, with a final stage that may not achieve the project’s goals. This model is illustrated in Figure 6.
Figure 6. Fragment of the project’s structural model considering limitations Lim1 to Lim5.
The target indicative model at the branching stage is described by a set of target indicators C 1 ,   C 2 ,   C 3 , evaluated at the current stage t and several previous stages, up to memory depth h:
C ( t , h ) = C 1 , C 2 , C 3 ( t ) ,   C 1 , C 2 , C 3 ( t 1 ) , , C 1 , C 2 , C 3 ( t h )
The decision rule for selecting a subscenario is expressed through a system of fuzzy production rules:
η Optim if F Optim then ContrInd Optim , η Base if F Base then ContrInd Base ,
η Pessim if F Pessim then ContrInd Pessim , η Catastr if F Catastr then ContrInd Catastr ,
where η Optim ,   η Base ,   η Pessim ,   η Catastr are the confidence degrees of the respective rules (ranging from 0 to 1), and ContrInd is a linguistic variable that takes values from the set {Optim, Base, Pessim, Catastr}. The formulas F Optim ,   F Base ,   F Pessim ,   F Catastr are fuzzy propositional formulas concerning the target indicators C ( t , h ) and external factors FACT ( t , τ ) corresponding to each subscenario.
The precise forms of these functions are determined by the specific characteristics of the project, and they can be viewed as a knowledge model of the project’s subject area. To select a subscenario based on these production rules, we propose using the Mamdani algorithm without defuzzification. The process flow is shown in Figure 7.
Figure 7. Iterative decision-making procedure for selecting project subscenarios.
The iterative nature of the procedure involves gradually increasing the memory depth h. The stopping condition is triggered by the decision-maker (e.g., when the solutions from the current and previous iterations coincide), ensuring the use of minimal memory depth. The procedure provides the decision-maker with results in the form
( Optim ,   μ Optim ) ,   ( Base ,   μ Base ) ,   ( Pessim ,   μ Pessim ) ,   ( Catastr ,   μ Catastr )
where μ Optim ,   μ Base ,   μ Pessim ,   μ Catastr represent the degree of preference for each subscenario (ranging from 0 to 1). This approach not only offers a recommended subscenario but also provides additional information on the confidence in the recommendation, allowing the decision-maker to factor in personal experience and non-formalized preferences.
However, it is important to note that increasing memory depth at the branching stage may result in error accumulation in input data, potentially affecting the solution’s quality. Therefore, decision-makers should be allowed to iteratively modify the list of target indicators and adjust memory depth to improve outcomes.
As part of the evaluation of the developed decision support tools, computational experiments were conducted to identify errors in subscenario selection caused by input data inaccuracies. The true values of the integral control indicator ContrInd were represented by samples x i , i = 1 , 2 , , N of a uniformly distributed random variable in the range [ 0 , 1 ] , while the error e i , i = 1 , 2 , , N was sampled from a normally distributed random variable N(0,0.1). The possible decisions are presented in Table 3.
Table 3. Decisions for selecting the base scenario.
In this table, negative superscripts indicate underestimation of project results, while positive superscripts indicate overestimation.
Table 4 compares error rates between crisp and fuzzy selection of project subscenarios.
Table 4. Comparison of error rates in crisp and fuzzy selection of subscenarios.
Since the most critical errors are false positives (F-P+, F-O+), which are less frequent with fuzzy inference, and the other error rates are nearly identical, the proposed fuzzy approach is preferable for subscenario selection.

7. Conclusions

In this study, we developed a hierarchy of project indicators in cybersecurity management and proposed methods for determining their values. We applied fuzzification to the project’s integral indicators, enabling a linguistic description of the project. Based on these linguistic values at the branching stage, fuzzy production rules were formulated to guide the selection of subscenarios, ensuring adaptability in project management. Decision support was implemented through the Mamdani fuzzy inference procedure [20,39].
The comparison of error rates between crisp and fuzzy methods in computational experiments demonstrated a 25% reduction in errors when using fuzzy procedures. Future research may focus on enhancing decision support tools by incorporating additional forms of uncertainty (e.g., using the Z-number approach) and leveraging modern simulation methods for discrete system behavior.

Author Contributions

Conceptualization, V.T. and I.M.; data curation, D.E.; formal analysis, V.T., V.L., A.L., D.E., and A.G.; funding acquisition, A.B., V.N., and A.G.; investigation, V.N., A.G., and I.M.; project administration, A.B., V.N., and A.G.; resources, A.L.; software, V.L.; supervision, A.B., V.N., and A.G.; validation, V.L., A.L., and D.E.; writing—original draft, V.T. and V.L.; writing—review and editing, I.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Peltier, T.R. Information Security Risk Analysis, 3rd ed.; CRC Press Taylor & Francis Group: Boca Raton, FL, USA, 2005. [Google Scholar]
  2. Seacord, R.C.; Householder, A.D. A Structured Approach to Classifying Security Vulnerabilities. 2005. Available online: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=6baac91ec76b059d7d7807c6706d8279d5afac08 (accessed on 26 September 2024).
  3. Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T. Information Security Risk Assessment. Encyclopedia 2021, 1, 602–617. [Google Scholar] [CrossRef]
  4. Hoffmann, R.; Napiórkowski, J.; Protasowicki, T.; Stanik, J. Risk Based Approach in Scope of Cybersecurity Threats and Requirements. Procedia Manuf. 2020, 44, 655–662. [Google Scholar] [CrossRef]
  5. Yusif, S.; Hafeez-Baig, A. A Conceptual Model for Cybersecurity Governance. J. Appl. Secur. Res. 2021, 16, 490–513. [Google Scholar] [CrossRef]
  6. Gordon, L.; Loeb, M.; Zhou, L. Investing in Cybersecurity: Insights from the Gordon-Loeb Model. J. Inf. Secur. 2021, 7, 49–59. [Google Scholar] [CrossRef]
  7. Lee, I. Cybersecurity: Risk Management Framework and Investment Cost Analysis. Bus. Horizons 2021, 64, 659–671. [Google Scholar] [CrossRef]
  8. Franco, M.F.; Lacerda, F.M.; Stiller, B. A Framework for the Planning and Management of Cybersecurity Projects in Small and Medium-Sized Enterprises. Rev. GestãO Proj. (GeP) 2022, 13, 10–37. [Google Scholar] [CrossRef]
  9. Dobrynin, A.; Gudkov, M.; Koinov, R. A Precedent Approach to Incident Management in Automated Process Control Systems. Softw. Syst. Comput. Methods 2020, 2020, 45–52. [Google Scholar] [CrossRef]
  10. Kulakov, S.; Trofimov, V.; Dobrynin, A.; Taraborina, E. Precedent Approach to the Formation of Programs for Cyclic Objects Control. IOP Conf. Ser. Mater. Sci. Eng. 2018, 354, 012002. [Google Scholar] [CrossRef]
  11. Sarker, I.H.; Janicke, H.; Ferrag, M.A.; Abuadbba, A. Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical infrastructures. Internet Things 2024, 25, 101110. [Google Scholar] [CrossRef]
  12. Sun, N.; Ding, M.; Jiang, J.; Xu, W.; Mo, X.; Tai, Y.; Zhang, J. Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Commun. Surv. Tutor. 2023, 25, 1748–1774. [Google Scholar] [CrossRef]
  13. Sharma, S.; Arjunan, T. Natural Language Processing for Detecting Anomalies and Intrusions in Unstructured Cybersecurity Data. Int. J. Inf. Cybersecur. 2023, 7, 1–24. [Google Scholar]
  14. Sarker, I.H.; Janicke, H.; Mohsin, A.; Gill, A.; Maglaras, L. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express 2024, 10, 935–958. [Google Scholar] [CrossRef]
  15. Sarker, I.H. Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview. Secur. Priv. 2023, 6, e295. [Google Scholar] [CrossRef]
  16. Malatji, M.; Tolah, A. Artificial intelligence (AI) cybersecurity dimensions: A comprehensive framework for understanding adversarial and offensive AI. In AI and Ethics; Spinger: Berlin/Heidelberg, Germany, 2024; pp. 1–28. [Google Scholar]
  17. Alqurashi, F.; Ahmad, I. A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling. Alex. Eng. J. 2024, 107, 374–389. [Google Scholar] [CrossRef]
  18. Kozhakhmet, K.; Bortsova, G.; Inoue, A.; Atymtayeva, L. Expert System for Security Audit Using Fuzzy Logic. In Proceedings of the Midwest Artificial Intelligence and Cognitive Science Conference, Cincinnati, OH, USA, 21–22 April 2012; Kazakh-British Technical University: Almaty, Kazakhstan, 2012. [Google Scholar]
  19. Zadeh, L.A. The Concept of a Linguistic Variable and its Application to Approximate Reasoning. Inf. Sci. 1975, 1, 119–249. [Google Scholar] [CrossRef]
  20. Zadeh, L. A Note on Z-Numbers. Inf. Sci. 2011, 181, 2923–2932. [Google Scholar] [CrossRef]
  21. Khorasani, E.S.; Patel, P.; Rahimi, S.; Houle, D. An Inference Engine Toolkit for Computing with Words. J. Ambient. Intell. Humaniz. Comput. 2013, 4, 409–410. [Google Scholar] [CrossRef]
  22. Vignieri, V. Performance Management in the Public Sector. In Global Encyclopedia of Public Administration, Public Policy, and Governance; Springer International Publishing: Cham, Switzerland, 2018; pp. 1–8. [Google Scholar]
  23. The Standard of the Bank of Russia STO BR IBBS-1.2-2014: Ensuring Information Security of Organizations of the Banking System of the Russian Federation. 2014. Available online: https://cbr.ru/statichtml/file/59420/st-12-14.pdf (accessed on 28 October 2024).
  24. Patwary, A.A.N.; Naha, R.K.; Garg, S.; Battula, S.K.; Patwary, M.A.K.; Aghasian, E.; Amin, M.B.; Mahanti, A.; Gong, M. Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control. Electronics 2021, 10, 1171. [Google Scholar] [CrossRef]
  25. Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 2023, 12, 1333. [Google Scholar] [CrossRef]
  26. Das, M.; Tao, X.; Liu, Y.; Cheng, J.C. A blockchain-based integrated document management framework for construction applications. Autom. Constr. 2022, 133, 104001. [Google Scholar] [CrossRef]
  27. Pizam, A.; Ozturk, A.B.; Hacikara, A.; Zhang, T.; Balderas-Cejudo, A.; Buhalis, D.; Fuchs, G.; Hara, T.; Meira, J.; Revilla, R.G.M.; et al. The role of perceived risk and information security on customers’ acceptance of service robots in the hotel industry. Int. J. Hosp. Manag. 2024, 117, 103641. [Google Scholar] [CrossRef]
  28. Santos-Olmo, A.; Sánchez, L.E.; Rosado, D.G.; Serrano, M.A.; Blanco, C.; Mouratidis, H.; Fernández-Medina, E. Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals. Front. Comput. Sci. 2024, 18, 183808. [Google Scholar] [CrossRef]
  29. Jomhari, N.; Alias, N.A.A.; Ellah, A.A.A.; Magableh, A.A.; Ghazali, E.M. A Multi-Criteria Decision-Making for Legacy System Modernization With FUCOM-WSM Approach. IEEE Access 2024, 12, 48608–48619. [Google Scholar] [CrossRef]
  30. Liu, Y.; Hu, Y.; Shen, K.; Qiu, J.; Neusypin, K.A. Integral Reinforcement Learning-Based Angular Acceleration Autopilot for High Dynamic Flight Vehicles. Appl. Soft Comput. 2024, 158, 111582. [Google Scholar] [CrossRef]
  31. Adam, F.; Humphreys, P. Encyclopedia of Decision Making and Decision Support Technologies; Hershey: New York, NY, USA, 2008; Volume 1. [Google Scholar]
  32. Saaty, T.L. Relative Measurement and Its Generalization in Decision Making: Why Pairwise Comparisons Are Central in Mathematics for the Measurement of Intangible Factors - The Analytic Hierarchy/Network Process. Rev. R. Span. Acad. Sci. Ser. A Math. 2008, 102, 251–318. [Google Scholar] [CrossRef]
  33. Burkov, V.N.; Burkova, I.V.; Gorgidze, I.A.; Burkov, V.N.; Burkova, I.V.; Gorgidze, I.A.; Gochitashvili, L.I.; Kajaia, T.N.; Lominadze, T.N.; Khartishvili, M.P. The Method of Network Programming for the Project Management. In Information and Computer Technologies—Theory and Practice: Proceedings of the International Scientific Conference ICTMC-2010 Devoted to the 80th Anniversary of I.V. Prangishvili; Nova Science Publishers Inc.: Hauppauge, NY, USA, 2012; pp. 131–147. [Google Scholar]
  34. Lomazov, V.A.; Gostischeva, T.V.; Klimova, N.A. Fuzzy Threat Analysis and the Choice of Options for the Information Security System of an Innovative Project. Mod. High-Tech Technol. 2017, 10, 26–31. [Google Scholar]
  35. Ptuskin, A.; Levner, E.; Kats, V. Cyclic Multi-Hoist Scheduling with Fuzzy Processing Times in Flexible Manufacturing Lines. Appl. Soft Comput. 2024, 165, 112014. [Google Scholar] [CrossRef]
  36. Russell, S.J.; Norvig, P. Artificial Intelligence: A Modern Approach; Prentice Hall: Englewood Cliffs, NJ, USA, 2020. [Google Scholar]
  37. Takagi, T.; Sugeno, M. Fuzzy Identification of Systems and Its Applications to Modeling and Control. IEEE Trans. Syst. Man, Cybern. 1985, SMC-15, 116–132. [Google Scholar] [CrossRef]
  38. Sugeno, M.; Kang, G. Structure Identification of Fuzzy Model. Fuzzy Sets Syst. 1988, 28, 15–33. [Google Scholar] [CrossRef]
  39. Kang, B.; Wei, D.; Li, Y.; Deng, Y. Method of Converting Z-Number to Classical Fuzzy Number. J. Inf. Comput. Sci. 2012, 9, 703–709. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.