DC FieldValueLanguage
dc.contributor.authorSimjanović, Dušanen_US
dc.contributor.authorVesić, Nenaden_US
dc.contributor.authorRanđelović, Branislaven_US
dc.contributor.authorVujadinović, Đorđijeen_US
dc.date.accessioned2023-11-27T10:45:52Z-
dc.date.available2023-11-27T10:45:52Z-
dc.date.issued2023-
dc.identifier.issn1613-0073-
dc.identifier.urihttp://researchrepository.mi.sanu.ac.rs/handle/123456789/5232-
dc.description.abstractOne of the main Cyber security's task is to ensure the real time protection of information and networks. In the last decade the number of cyber security attacks and its frequency has increased, creating the need for new data protection systems. In this paper we present two groups of criteria with a total of eight sub-criteria affecting cyber security, and their ranking using Fuzzy AHP. The Data/password leak, Fishing detection and DoS attack detection are recognized as the most important sub-criteria.en_US
dc.publisherCEUR-WSen_US
dc.rightsAttribution 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectAHP | criteria | cyber security | Fuzzy AHPen_US
dc.titleCyber Security Criteria: Fuzzy AHP approachen_US
dc.typeConference Paperen_US
dc.relation.conference13th International Conference on Business Information Security, BISEC 2022, Belgrade, 2 December 2022en_US
dc.relation.publicationCEUR Workshop Proceedingsen_US
dc.identifier.scopus2-s2.0-85177027433-
dc.contributor.affiliationMathematicsen_US
dc.contributor.affiliationMathematical Institute of the Serbian Academy of Sciences and Artsen_US
dc.relation.firstpage50-
dc.relation.lastpage55-
dc.relation.volume3529-
item.grantfulltextopen-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeConference Paper-
crisitem.author.orcid0000-0002-7598-9058-
Files in This Item:
File Description SizeFormat
NVesic.pdf1.12 MBAdobe PDFView/Open
Show simple item record

SCOPUSTM   
Citations

1
checked on Sep 7, 2024

Page view(s)

3
checked on Sep 7, 2024

Download(s)

2
checked on Sep 7, 2024

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons