Cited by 50
Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach

2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)
Yuxiao Luo
Conference:  (2022), p. 193
Optimization of Logistic Flows in the Mail Processing System in the Republic of Kazakhstan
Askar Boranbayev, Seilkhan Boranbayev, Malik Baimukhamedov, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (Advances in Information and Communication) Volume 1363 (2021), p. 182
Evaluating and Applying Risk Remission Strategy Approaches to Prevent Prospective Failures in Information Systems
Askar Boranbayev, Seilkhan Boranbayev, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (17th International Conference on Information Technology–New Generations (ITNG 2020)) Volume 1134 (2020), p. 647
Development of a Hardware-Software System for the Assembled Helicopter-Type UAV Prototype by Applying Optimal Classification and Pattern Recognition Methods
Askar Boranbayev, Seilkhan Boranbayev, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (Intelligent Computing) Volume 1229 (2020), p. 380
Development of a Software System for Simulation and Calculation of the Optimal Time of Upgrading Equipment
Askar Boranbayev, Seilkhan Boranbayev, Yuri Yatsenko, Yersultan Tulebayev, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (Advances in Information and Communication) Volume 1363 (2021), p. 990
Methods and Techniques of Information Security Risk Management During Assessment of Information Systems
Seilkhan Boranbayev, Askhat Amrenov, Assel Nurusheva, Askar Boranbayev, Nikolaj Goranin
Book:  Lecture Notes in Networks and Systems (Advances in Information and Communication) Volume 439 (2022), p. 787
Tvarių statinio sprendinių modeliavimas taikant BIM technologijas
Arvydas Kiaulakis
Dissertation:  Tvarių statinio sprendinių modeliavimas taikant BIM technologijas (2022)
Measures to Ensure the Reliability of the Functioning of Information Systems in Respect to State and Critically Important Information Systems
Askar Boranbayev, Seilkhan Boranbayev, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (Intelligent Systems and Applications) Volume 1252 (2021), p. 139
Proposing Recommendations for Improving the Reliability and Security of Information Systems in Governmental Organizations in the Republic of Kazakhstan
Askar Boranbayev, Seilkhan Boranbayev, Yerzhan Seitkulov, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3) Volume 1290 (2021), p. 854
Java Based Application Development for Facial Identification Using OpenCV Library
Askar Boranbayev, Seilkhan Boranbayev, Askar Nurbekov
Book:  Advances in Intelligent Systems and Computing (Intelligent Systems and Applications) Volume 1251 (2021), p. 77
Method and Information Technology to Support Decision-Making for Determining the Level of Reliability of Information Systems
Askar Boranbayev, Seilkhan Boranbayev, Nurbek Sissenov, Askar Nurbekov
Book:  Lecture Notes in Networks and Systems (Advances in Information and Communication) Volume 439 (2022), p. 798
The Method of Analysis of Data from Social Networks Using Rapidminer
Askar Boranbayev, Gabit Shuitenov, Seilkhan Boranbayev
Book:  Advances in Intelligent Systems and Computing (Intelligent Computing) Volume 1229 (2020), p. 667
2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
Ming Lei, Lianying Zhao, Makan Pourzandi, Fereydoun Farrahi Moghaddam
Conference:  (2022), p. 178
INTERNATIONAL CONFERENCE ON ELECTRONICS, ENGINEERING PHYSICS, AND EARTH SCIENCE
S. Ramya, S. Praveen Kumar, M. Himashinii, D. Lingaraja, G. Dinesh Ram, T. Aravind
Conference:  INTERNATIONAL CONFERENCE ON ELECTRONICS, ENGINEERING PHYSICS, AND EARTH SCIENCE (INTERNATIONAL CONFERENCE ON ELECTRONICS, ENGINEERING PHYSICS, AND EARTH SCIENCE) Volume 3063 (2024), p. 020020
A NEW HYBRID FUZZY PSI-PIPRECIA-COCOSO MCDM BASED APPROACH TO SOLVING THE TRANSPORTATION COMPANY SELECTION PROBLEM
Alptekin Ulutaş, Gabrijela Popovic, Pavle Radanov, Dragisa Stanujkic, Darjan Karabasevic
Journal:  Technological and Economic Development of Economy Volume 27, Issue 5 (2021), p. 1227
Pub. online: 15 Jul 2021      Type: Research Article      Open accessOpen Access
Journal:  Informatica Volume 32, Issue 3 (2021), pp. 583–618
   Abstract
A Study on the Strategic Decision Making Used in the Revitalization of Fishing Village Tourism: Using A’WOT Analysis
Sangmin Lee, Donghan Kim, Sunwoo Park, Wonseok Lee
Journal:  Sustainability Volume 13, Issue 13 (2021), p. 7472
A Three-Stage Dynamic Assessment Framework for Industrial Control System Security Based on a Method of W-HMM
Xudong Ji, Hongxing Wei, Youdong Chen, Xiao-Fang Ji, Guo Wu
Journal:  Sensors Volume 22, Issue 7 (2022), p. 2593
A fuzzy ANP–DEMATEL model on faulty behavior risks: implications for improving safety in the workplace
Koppiahraj Karuppiah, Bathrinath Sankaranarayanan, Syed Mithun Ali
Journal:  International Journal of Occupational Safety and Ergonomics Volume 28, Issue 2 (2022), p. 923
A neutrosophic AHP-based computational technique for security management in a fog computing network
Jasleen Kaur, Rajeev Kumar, Alka Agrawal, Raees Ahmad Khan
Journal:  The Journal of Supercomputing Volume 79, Issue 1 (2023), p. 295
An information asset priority evaluation method with analytic network process
Yixian Liu, Dejun Mu
Journal:  Information Services & Use Volume 43, Issue 1 (2023), p. 19
Application of Shannon Entropy and COCOSO techniques to analyze performance of sustainable development goals: The case of the Indian Union Territories
Pankaj Prasad Dwivedi, Dilip Kumar Sharma
Journal:  Results in Engineering Volume 14 (2022), p. 100416
Application of the AHP method on the optimization with undesirable priorities
Jie Liang, Jianhui Yang
Journal:  Engineering with Computers Volume 38, Issue S3 (2022), p. 2137
Assessment of Progress towards Achieving Sustainable Development Goals of the “Agenda 2030” by Using the CoCoSo and the Shannon Entropy Methods: The Case of the EU Countries
Dragisa Stanujkic, Gabrijela Popovic, Edmundas Kazimieras Zavadskas, Darjan Karabasevic, Arune Binkyte-Veliene
Journal:  Sustainability Volume 12, Issue 14 (2020), p. 5717
Assessment of Sustainable Maintenance Strategy for Manufacturing Industry
Desmond Eseoghene Ighravwe
Journal:  Sustainability Volume 14, Issue 21 (2022), p. 13850
Assessment of agricultural land suitability for irrigation with reclaimed water using geospatial multi-criteria decision analysis
Manashi Paul, Masoud Negahban-Azar, Adel Shirmohammadi, Hubert Montas
Journal:  Agricultural Water Management Volume 231 (2020), p. 105987
Assessment of barriers to IoT-enabled circular economy using an extended decision- making-based FMEA model under uncertain environment
Ali Memarpour Ghiaci, Saeid Jafarzadeh Ghoushchi
Journal:  Internet of Things Volume 22 (2023), p. 100719
Construction of information network vulnerability threat assessment model for CPS risk assessment
Juxia Xiong, Jinzhao Wu
Journal:  Computer Communications Volume 155 (2020), p. 197
Critical Infrastructures Overview: Past, Present and Future
Fabio De Felice, Ilaria Baffo, Antonella Petrillo
Journal:  Sustainability Volume 14, Issue 4 (2022), p. 2233
Determination of Importance of Key Decision Points in the Technology Commercialization Process: Attitude of the US and German Experts
Vaida Zemlickienė, Zenonas Turskis
Journal:  Sustainability Volume 14, Issue 23 (2022), p. 15847
EVALUATION OF THE EXPEDIENCY OF TECHNOLOGY COMMERCIALIZATION: A CASE OF INFORMATION TECHNOLOGY AND BIOTECHNOLOGY
Vaida Zemlickienė, Zenonas Turskis
Journal:  Technological and Economic Development of Economy Volume 26, Issue 1 (2020), p. 271
Educational Organization’s Security Level Estimation Model
Simona Ramanauskaitė, Neringa Urbonaitė, Šarūnas Grigaliūnas, Saulius Preidys, Vaidotas Trinkūnas, Algimantas Venčkauskas
Journal:  Applied Sciences Volume 11, Issue 17 (2021), p. 8061
Evaluation and Classification Risks of Implementing Blockchain in the Drug Supply Chain with a New Hybrid Sorting Method
Parisa Sabbagh, Rana Pourmohamad, Marischa Elveny, Mohammadali Beheshti, Afshin Davarpanah, Ahmed Sayed M. Metwally, Shafaqat Ali, Amin Salih Mohammed
Journal:  Sustainability Volume 13, Issue 20 (2021), p. 11466
Features-Based IoT Security Authentication Framework Using Statistical Aggregation, Entropy, and MOORA Approaches
Habib Ullah Khan, Muhammad Sohail, Shah Nazir
Journal:  IEEE Access Volume 10 (2022), p. 109326
Hydrogen energy storage method selection using fuzzy axiomatic design and analytic hierarchy process
Mumtaz Karatas
Journal:  International Journal of Hydrogen Energy Volume 45, Issue 32 (2020), p. 16227
Improving renewable energy policy planning and decision-making through a hybrid MCDM method
Reza Alizadeh, Leili Soltanisehat, Peter D. Lund, Hamed Zamanisabzi
Journal:  Energy Policy Volume 137 (2020), p. 111174
Intelligent analysis system for signal processing tasks based on LSTM recurrent neural network algorithm
Ya Zhou, Xiaobo Jiao
Journal:  Neural Computing and Applications Volume 34, Issue 15 (2022), p. 12257
MULTI-CRITERIA ANALYSIS OF URBANIZED AREA DEVELOPMENT CONCEPTS
Viktorija Vitkauskienė
Journal:  Mokslas - Lietuvos ateitis Volume 15 (2023), p. 1
Minimizing incident response time in real-world scenarios using quantum computing
Manuel A. Serrano, Luis E. Sánchez, Antonio Santos-Olmo, David García-Rosado, Carlos Blanco, Vita Santa Barletta, Danilo Caivano, Eduardo Fernández-Medina
Journal:  Software Quality Journal Volume 32, Issue 1 (2024), p. 163
Prioritization of the treatment and disposal methods of wastes containing polychlorinated biphenyl by fuzzy multi-criteria decision-making and risk assessment
Elanur Adar, Buket Karatop, Mehmet Sinan Bilgili, Mahir İnce
Journal:  Environmental Monitoring and Assessment Volume 192, Issue 7 (2020)
QISS: Quantum-Enhanced Sustainable Security Incident Handling in the IoT
Carlos Blanco, Antonio Santos-Olmo, Luis Enrique Sánchez
Journal:  Information Volume 15, Issue 4 (2024), p. 181
RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments
Christina Michailidou, Vasileios Gkioulos, Andrii Shalaginov, Athanasios Rizos, Andrea Saracino
Journal:  Sensors Volume 20, Issue 10 (2020), p. 2960
Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set
Wentian Cai, Huijun Yao, Zhihan Lv
Journal:  Wireless Communications and Mobile Computing Volume 2021 (2021), p. 1
Retrieval and Ranking of Combining Ontology and Content Attributes for Scientific Document
Xinyu Jiang, Bingjie Tian, Xuedong Tian
Journal:  Entropy Volume 24, Issue 6 (2022), p. 810
Pub. online: 18 Dec 2020      Type: Research Article      Open accessOpen Access
Journal:  Informatica Volume 32, Issue 1 (2021), pp. 41–67
   Abstract
Risk Treatment for Energy-Oriented Production Plans through the Selection, Classification, and Integration of Suitable Measures
Stefan Roth, Mirjam Huber, Johannes Schilp, Gunther Reinhart
Journal:  Applied Sciences Volume 12, Issue 13 (2022), p. 6410
SETTING PRIORITY LIST FOR CONSTRUCTION WORKS OF BICYCLE PATH SEGMENTS BASED ON ECKENRODE RATING AND ARAS-F DECISION SUPPORT METHOD INTEGRATED IN GIS
Jurgis Zagorskas, Zenonas Turskis
Journal:  Transport Volume 35, Issue 2 (2020), p. 179
Symmetric and Asymmetric Data in Solution Models
Edmundas Kazimieras Zavadskas, Jurgita Antucheviciene, Zenonas Turskis
Journal:  Symmetry Volume 13, Issue 6 (2021), p. 1045
Technology Development Decision-Making Points and Differences in Identifying Commercial Opportunities for Mechatronics, Laser, and Nanoelectronic Technologies
Vaida Zemlickienė, Zenonas Turskis
Journal:  Sustainability Volume 14, Issue 12 (2022), p. 7385
The successful implementation of industry 4.0 in manufacturing: An analysis and prioritization of risks in Irish industry
Pezhman Ghadimi, Oisin Donnelly, Kubra Sar, Chao Wang, Amir Hossein Azadnia
Journal:  Technological Forecasting and Social Change Volume 175 (2022), p. 121394