Neutrosophic Super-Hypergraph Fusion for Proactive Cyberattack Countermeasures: A Soft Computing Framework

Faculty Computer Science Year: 2025
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Neutrosophic Sets and Systems Neutrosophic Sets and Systems Volume:
Keywords : Neutrosophic Super-Hypergraph Fusion , Proactive Cyberattack Countermeasures:    
Abstract:
Cyberattacks have become increasingly sophisticated, posing significant risks to critical infrastructures and digital ecosystems. Traditional defense mechanisms often fail to cope with the uncertainty and evolving nature of such threats, highlighting the importance of soft computing approaches for proactive cybersecurity. Recent studies have shown promising results in this direction. For instance, the pNHSS-CAD framework utilized neutrosophic hypersoft sets to model the complexity of cyberattacks, offering effective handling of uncertainty but remaining primarily conceptual. Similarly, Neutrosophic Neural Networks were applied to IoT environments, combining neutrosophic logic with neural networks to achieve high detection accuracy; however, their applicability was restricted to IoT-specific domains.
   
     
 
       

Author Related Publications

  • Ehab Roshdy Mohamed, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Ehab Roshdy Mohamed, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Ehab Roshdy Mohamed, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Ehab Roshdy Mohamed, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Ehab Roshdy Mohamed, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet