Neutrosophic Super-Hypergraph Fusion for Proactive Cyberattack Countermeasures: A Soft Computing Framework

Faculty Computer Science Year: 2025
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Neutrosophic Sets and Systems Neutrosophic Sets and Systems Volume:
Keywords : Neutrosophic Super-Hypergraph Fusion , Proactive Cyberattack Countermeasures:    
Abstract:
Cyberattacks have become increasingly sophisticated, posing significant risks to critical infrastructures and digital ecosystems. Traditional defense mechanisms often fail to cope with the uncertainty and evolving nature of such threats, highlighting the importance of soft computing approaches for proactive cybersecurity. Recent studies have shown promising results in this direction. For instance, the pNHSS-CAD framework utilized neutrosophic hypersoft sets to model the complexity of cyberattacks, offering effective handling of uncertainty but remaining primarily conceptual. Similarly, Neutrosophic Neural Networks were applied to IoT environments, combining neutrosophic logic with neural networks to achieve high detection accuracy; however, their applicability was restricted to IoT-specific domains.
   
     
 
       

Author Related Publications

  • Ehab Roshdy Mohamed, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Ehab Roshdy Mohamed, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Ehab Roshdy Mohamed, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Ehab Roshdy Mohamed, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Ehab Roshdy Mohamed, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More
  • Ehab Roshdy Mohamed, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More
Tweet