Next Article in Journal
PDCA 4.0: A New Conceptual Approach for Continuous Improvement in the Industry 4.0 Paradigm
Next Article in Special Issue
Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework
Previous Article in Journal
Shear Resistance Assessment of the Y-Type Perfobond Rib Shear Connector under Repeated Loadings
Previous Article in Special Issue
Privacy Preserving Face Recognition in Cloud Robotics: A Comparative Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations

1
Department of Mathematics, Institute of Numerical Sciences, Gomal University, Dera Ismail Khan 29050, Pakistan
2
STC’s Artificial Intelligence Chair, Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
3
Computer Sciences Program, Turabah University College, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(16), 7668; https://doi.org/10.3390/app11167668
Submission received: 10 June 2021 / Revised: 7 August 2021 / Accepted: 18 August 2021 / Published: 20 August 2021
(This article belongs to the Special Issue Cyber Security of Critical Infrastructures)

Abstract

:
Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying its effects using righteous cybersecurity. For that reason, this article introduces interval-valued complex intuitionistic fuzzy relations (IVCIFRs). For the first time in the theory of fuzzy sets, we investigated the relationships among different types of cybersecurity and the sources of cyberattacks. Moreover, the Hasse diagram for the interval-valued complex intuitionistic partial order set and relation is defined. The concepts of the Hasse diagram are used to inspect different cybersecurity techniques and practices. Then, using the properties of Hasse diagrams, the most beneficial technique is identified. Furthermore, the best possible selection of types of cybersecurity is made after putting some restrictions on the selection. Lastly, the advantages of the proposed methods are illuminated through comparison tests.

1. Introduction

Mathematical modeling is a process of transforming practical problems and real life events into a mathematical form. Human opinions and views are generally imprecise and unclear. Similarly, experimental errors, inaccuracies and miscalculations lead to inexact results. Hence, uncertainty is an inevitable part of our lives. Information is often complex, unknowable and puzzling. Modeling uncertainty was almost impossible before 1965 when Zadeh [1] introduced the world to a life changing theory of fuzzy sets (FS) and fuzzy logic. This theory opened up new gates for mathematicians because it could model uncertainty such as complexity in human opinions and errors in scientific experimentations. An FS is a set that associates a mapping ḿ to each of its elements, where ḿ is called the degree of membership that attains values from the [ 0 ,   1 ] interval.
The concept of relations between crisp sets was defined by Klir [2]. Crisp sets are limited to only two possibilities; the elements are either a member of a set or not a member of a set. In other words, crisp sets and their relations only work with yes-and-no-type problems. This theory of sets deals with exact information and cannot be used to model uncertainty. Mendel [3] invented the concepts of relations for FSs, which are called fuzzy relations (FRs). FRs are not just limited to respond in yes-or-no, but they can also specify the strength, grade and level of good relations between any pair of FSs. This depends on its degree of membership: if the value of the degree of membership is near one then the relation is said to be a strong relation, while values near zero are the sign of weak relationship. FRs generalize crisp relations because, if the values of the degrees of membership of each element of an FR are restricted to zero (0) and one (1), then the FR becomes a crisp relation. In 1975, Zadeh [4] generalized FSs and introduced the idea of interval-valued fuzzy sets (IVFSs). An IVFS replaces the single value of the degree of membership in an FS by an interval, whose extremes belong to a [ 0 ,   1 ] interval, i.e., the degree of membership is a subinterval of a [ 0 ,   1 ] interval. The concept of relation was introduced to IVFSs by Bustince and Burillo [5], called the interval-valued fuzzy relation (IVFR). Goguen [6] gave a system of axioms for a relatively simple form of FS theory; Zywica [7] modeled the medical uncertainties using FSs; Roman-Flores et al. [8] proposed a note on Zadeh’s extensions; Dubious and Prade [9] discussed uncertainty, bipolarity and gradualness through FSs; Gehrke et al. [10] commented on IVFSs; Bustince [11] applied IVFSs to approximate reasoning; Turksen [12] entitled his work IVFSs and compensatory AND.
In 2002, Ramot et al. [13] came up with an innovative idea of switching to complex valued mappings as the degrees of membership of a set. They introduced the complex fuzzy set (CFS) in which the degree of membership takes on values from a unit disk of a complex plane. Since the degrees of membership in a CFS are complex numbers, thus, they involve two parts: the real and imaginary parts. Each of these parts corresponds to a different entity. The real part is known as the amplitude term of the degree of membership, while the imaginary part is said to be the phase term of the degree of membership. Most often, CFSs are used to model phase altering problems. When the phase term or the imaginary part of the degree of membership is set to zero in the CFS, it becomes an FS. Further, Ramot et al. [14] defined complex fuzzy relations (CFRs), which are used to find the relationships between CFSs. Greenfield et al. [15] changed the degree of membership of a CFS from a single number to an interval, thus bringing up the notion of interval-valued complex fuzzy set (IVCFS). Recently, Nasir et al. [16] defined interval-valued complex fuzzy relations as being used for studying the relationships between two or more IVCFSs. Chen et al. [17] studied a neuro-fuzzy architecture employing CFSs; Yazdanbakhsh and Dick [18] reviewed the CFSs; Tamir et al. [19] proposed some applications of CFSs; Dai et al. [20] formulated distance measures between IVCFSs; Greenfield et al. [21] defined the join and meet operations for IVCFSs.
According to the definition of an FS, it only discusses the degree of membership   ḿ , but it also covers the degree of non-membership   , which is the complement of the degree of membership with respect to unit interval, i.e., = 1 ḿ . This hidden feature of FSs led to the definition of the intuitionistic fuzzy set (IFS), proposed by Atanassov [22]. An IFS associates two mappings to each of its elements, which are called the degree of membership and the degree of non-membership. Both of these mappings take on values from [ 0 ,   1 ] interval given that their sum also lies within the range of this interval. The idea of the intuitionistic fuzzy relation (IFR) was concocted by Burillo et al. [23]. In 1999, Atanassov [24] expressed the degree of membership and the degree of non-membership of an IFS in the form of intervals and, hence, developed a new concept called the interval-valued intuitionistic fuzzy set (IVIFS). Complex valued mappings were brought in to IFS theory by Alkouri et al. [25] in 2012, who introduced the notion of the complex intuitionistic fuzzy set (CIFS). Garg and Rani [26] put forward the interval-valued complex intuitionistic fuzzy relation (IVCIFS). Li [27] used IFSs for multiattribute decision-making (MD) models and methods; De et al. [28] applied IFSs in medical diagnosis; Vlachos and Sergiadis [29] applied IFSs to pattern recognition; Lee et al. [30] compared IVFSs, IFSs and bipolar-valued FSs; Grzegorzewski [31] used Hausdorff metric for finding the distances between IVFSs and IFSs; Nasir et al. [32,33,34,35] applied complex relations to analysis of economic relationships. Ali et al. [36] studied complex intuitionistic fuzzy classes; Liu and Jiang [37] proposed a new distance measure of IVIFSs and applied it in decision making; Bustince and Burillo [38] devised the correlation of IVIFSs; Nayagam and Sivaraman [39] proposed a method of ranking IVIFSs. Otero et al. [40] proposed the application of fuzzy logic in assessing the security control for organizations; Tariq et al. [41,42] also used fuzzy theory to rank and prioritize the security controls for cloud wireless sensor networks and computing networks; Mokhtari et al. [43] used fuzzy multiple-attribute decision-making techniques for selecting the best control system.
In this paper, the Cartesian product (CP) of two IVCIFSs is introduced. Furthermore, the innovative conception of an interval-valued complex intuitionistic fuzzy relation (IVCIFR) is defined by using the concept of the CP of IVCIFSs. Moreover, the types of IVCIFRs have been defined, including the interval-valued complex intuitionistic converse fuzzy relation, interval-valued complex intuitionistic equivalence fuzzy relation, interval-valued complex intuitionistic partial order fuzzy relation, interval-valued complex intuitionistic total order fuzzy relation, interval-valued complex intuitionistic composite fuzzy relation and many more. Every definition is held by the examples. In addition, some results have been proved for the type of IVCIFRs. Besides these, the Hasse diagrams for interval-valued complex intuitionistic partial order fuzzy sets and relations have also been presented. Furthermore, the ideas related to a Hasse diagram: maximum element, minimum element, maximal element, minimal element, supremum, infimum, upper and lower bounds are discussed. The novel concepts introduced in this study, i.e., IVCIFSs and IVCIFRs are superior to the pre-existing frameworks of FSs, IFSs, IVFSs, IVIFSs, CFSs, CIFSs and IVCFSs. Since IVCIFRs analyze the relationships among the IVCIFSs, so they are composed of the degrees of membership and non-membership, which are in the form of intervals with complex numbers. These notions can handle uncertainty much better than other mentioned concepts. The advantage of the interval-values is that they cover the little mistakes, ambiguities and errors made by decision makers and experts. In addition, their intuitionistic-type structure talks about the degree of membership and the degree of non-membership. Due to the complex valued mappings, they are also capable of handling information with multiple variables.
Every now and then, enterprises, corporations, industries and business companies shift their structures and organizations to a digital system. These computerized systems are extremely beneficial, but they are also vulnerable to many risky attacks and threats, which are known as cybercrimes. Different techniques, practices, tools and methods called cybersecurities, are used to tackle cybercrimes. At times, it can be challenging to detect the type of cybercrime, thus leaving many uncertainties. Similarly, there are also hesitations in employing the right cybersecurity techniques to rescue the business or companies from attacks as there are so many options out there to overcome these threats and risks. The selection of the most appropriate security technique may be difficult due to uncertainties and an inability to make the right decision. Therefore, in order to overcome all these uncertainties, we used the fuzzy theory. This article mathematically analyzes the relationships among cybersecurities and the sources of cyberattacks in an industrial control system (ICS), such as the effectiveness and ineffectiveness of cybersecurity against a certain source. Moreover, the current article also proposes a method to inspect different types of cybersecurity and choose the best one for an organization or network. This innovative method is based on the concepts of Hasse diagrams and interval-valued complex intuitionistic partial order fuzzy relations. Furthermore, the proposed methods are compared with other similar methods that pre-exist in the literature. The dominance and the reliability of the introduced methods are verified using numerical problems as the complex relations have not yet been discovered in fuzzy set theory. Henceforth, there is a great opportunity for potential research work to be carried out to explore these structures.
The arrangement of the remaining the paper is as follows:
Section 2 reviews some predefined concepts of fuzzy set theory that are used as the basis for the paper. Section 3 introduces the innovative conceptions of IVCIFRs, CPs between two IVCIFSs, the types of IVCIFRs and some theorems are also proved. In Section 4, we deliberate on the Hasse diagram for interval-valued complex intuitionistic partial order fuzzy sets and relations, including some useful properties and definitions related to Hasse diagrams. Section 5 offers two applications of IVCIFSs and IVCIFRs. The first application investigates cybercrimes, cyber-securities and the sources of penetration in an industrial control system (ICS). The second application uses Hasse diagrams and interval-valued complex intuitionistic partial order fuzzy relations to find the best cybersecurity technique. The existing structures in the field of fuzzy set theory are compared with the proposed structures in Section 6. Finally, the paper ends with the conclusion.

2. Preliminaries

In this section, some basic definitions and their examples are presented such as fuzzy set (FS), interval-valued fuzzy set (IVFS), complex fuzzy set (CFS), interval-valued complex fuzzy set (IVCFS), Cartesian product (CP) of two IVCFSs, interval-valued complex fuzzy relation (IVCFR), intuitionistic fuzzy set (IFS), complex intuitionistic fuzzy set (CIFS), and interval-valued complex intuitionistic fuzzy set (IVCIFS).
Definition 1.
Ref. [1] A fuzzy set (FS)  in a universe  Տ is of the following form
= { ( x , ḿ ( x ) ) : x Տ }
where  ḿ : [ 0 ,   1 ] is a mapping called degree of membership.
Example 1.
= { ( s , 0 ) , ( t , 0.63 ) , ( u , 0.97 ) , ( v , 0.26 ) , ( w , 0.18 ) , ( x , 1 ) ,   ( y , 0.85 ) , ( z , 0.35 ) } is an FS.
Definition 2.
Ref. [4] An interval-valued fuzzy set (IVFS)  in a universe  Տ is of the following form
= { ( x , [ ḿ ( x ) , ḿ + ( x ) ] ) : x Տ }
where  ḿ : [ 0 ,   1 ]  and  ḿ + : [ 0 ,   1 ] are the mappings called lower and upper degrees of membership, respectively.
Example 2.
= { ( u , [ 0.32 , 0.68 ] ) , ( v , [ 0.16 , 0.26 ] ) , ( w , [ 0.58 , 0.63 ] ) , ( x , [ 0.55 , 0.66 ] ) , ( y , [ 0.23 , 0.49 ] ) , ( z , [ 0.87 , 1 ] ) } is an IVFS.
Definition 3.
Ref. [13] A complex fuzzy set (CFS) in a universe  Տ is of the following form
= { ( x , ḿ ( x ) ) : x Տ }
where  ḿ : Z   0 | Z | 1  and Z is a complex number. The mapping ḿ is called degree of membership. Equivalently, the CFS can also be represented in the following form
= { ( x , α ( x ) e i 2 ρ ( x ) π ) : x Տ }
where α : [ 0 ,   1 ]  and ρ : [ 0 ,   1 ]  are mappings called amplitude term and phase term of degree of membership and  i = 1 .
Example 3.
= { ( u , 0.15 e i 2 ( 0.58 ) π ) , ( v , 0.75 e i 2 ( 0.23 ) π ) , ( w , 0.65 e i 2 ( 0.42 ) π ) , ( x , 0 e i 2 ( 1 ) π ) , ( y , 1 e i 2 ( 0 ) π ) , ( z , 0.93 e i 2 ( 0.37 ) π ) } is a CFS.
Definition 4.
Ref. [15] An interval-valued complex fuzzy set (IVCFS)  in a universe  Տ is of the following form
= { ( x , [ ḿ ( x ) , ḿ + ( x ) ] ) : x Տ }
where ḿ : Z and ḿ + : Z   0 | Z | 1 and Z  is a complex number. The mappings  ḿ  and ḿ + are called the lower and upper degrees of membership, respectively. Equivalently, the IVCFS can also be represented in the following form
= { ( x , [ α ( x ) , α + ( x ) ] e i 2 [ ρ ( x ) , ρ + ( x ) ] π ) : x Տ }
where α : [ 0 ,   1 ] ,  α + : [ 0 ,   1 ] , ρ : [ 0 ,   1 ] and ρ + : [ 0 ,   1 ] are mappings called the lower amplitude term, upper amplitude term, lower phase term and upper phase term of degree of membership and i = 1 .
Example 4.
= { ( w , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.61 ] π ) , ( x , [ 0.17 , 0.23 ] e i 2 [ 0.67 , 0.81 ] π ) , ( y , [ 0.45 , 0.50 ] e i 2 [ 0.04 , 0.21 ] π ) , ( z , [ 0.89 , 0.98 ] e i 2 [ 0 , 0.16 ] π ) } is an IVCFS.
Definition 5.
Ref. [16] Let  = { ( x , [ α ( x ) , α + ( x ) ] e i 2 [ ρ ( x ) , ρ + ( x ) ] π ) : x Տ } and = { ( y , [ α ( y ) , α + ( y ) ] e i 2 [ ρ ( y ) , ρ + ( y ) ] π ) : y Տ } be two IVCFSs in a universe  Տ , then their Cartesian product is given as
× = { ( ( x , y ) , [ α × ( x , y ) , α × + ( x , y ) ] e i 2 [ ρ × ( x , y ) , ρ × + ( x , y ) ] π ) : x , y }
where  α × ( x , y ) = min { α ( x ) , α ( y ) } , α × + ( x , y ) = min { α + ( x ) , α + ( y ) } ρ × ( x , y ) = min { ρ ( x ) , ρ ( y ) }  and  ρ × + ( x , y ) = min { ρ + ( x ) , ρ + ( y ) } .
Definition 6.
Ref. [16] The interval-valued complex fuzzy relation (IVCFR) is a subset of the Cartesian product of any two IVCFSs, i.e., × , where   and   are IVCFSs and  denotes the IVCFR.
Example 5.
The Cartesian product of two IVCFSs
= { ( s , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.61 ] π ) , ( t , [ 0.17 , 0.23 ] e i 2 [ 0.67 , 0.81 ] π ) , ( u , [ 0.45 , 0.50 ] e i 2 [ 0.04 , 0.21 ] π ) , ( v , [ 0.89 , 0.98 ] e i 2 [ 0 , 0.16 ] π ) }   and
= { ( w , [ 0.53 , 0.64 ] e i 2 [ 0.29 , 0.37 ] π ) , ( x , [ 0.73 , 0.79 ] e i 2 [ 0.43 , 0.52 ] π ) , ( y , [ 0.19 , 0.35 ] e i 2 [ 0.24 , 0.35 ] π ) , ( z , [ 0.39 , 0.55 ] e i 2 [ 0.45 , 0.55 ] π ) }   is
× = { ( ( s , w ) , [ 0.28 , 0.36 ] e i 2 [ 0.29 , 0.37 ] π ) , ( ( s , x ) , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.52 ] π ) , ( ( s , y ) , [ 0.19 , 0.35 ] e i 2 [ 0.24 , 0.36 ] π ) , ( ( s , z ) , [ 0.28 , 0.36 ] e i 2 [ 0 , 0.16 ] π ) , ( ( t , w ) , [ 0.17 , 0.23 ] e i 2 [ 0.29 , 0.37 ] π ) , ( ( t , x ) , [ 0.17 , 0.23 ] e i 2 [ 0.43 , 0.52 ] π ) , ( ( t , y ) , [ 0.17 , 0.23 ] e i 2 [ 0.24 , 0.35 ] π ) , ( ( t , z ) , [ 0.17 , 0.23 ] e i 2 [ 0.45 , 0.55 ] π ) , ( ( u , w ) , [ 0.45 , 0.50 ] e i 2 [ 0.04 , 0.21 ] π ) , ( ( u , x ) , [ 0.45 , 0.50 ] e i 2 [ 0.04 , 0.21 ] π ) , ( ( u , y ) , [ 0.19 , 0.35 ] e i 2 [ 0.04 , 0.21 ] π ) , ( ( u , z ) , [ 0.39 , 0.50 ] e i 2 [ 0.04 , 0.21 ] π ) , ( ( v , w ) , [ 0.53 , 0.64 ] e i 2 [ 0.29 , 0.37 ] π ) , ( ( v , x ) , [ 0.73 , 0.79 ] e i 2 [ 0 , 0.16 ] π ) , ( ( v , y ) , [ 0.19 , 0.35 ] e i 2 [ 0 , 0.16 ] π ) , ( ( v , z ) , [ 0.39 , 0.55 ] e i 2 [ 0 , 0.16 ] π ) }
The IVCFR . between the IVCFSs and is given
= { ( ( s , w ) , [ 0.28 , 0.36 ] e i 2 [ 0.29 , 0.37 ] π ) , ( ( s , x ) , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.52 ] π ) , ( ( t , x ) , [ 0.17 , 0.23 ] e i 2 [ 0.43 , 0.52 ] π ) , ( ( u , w ) , [ 0.45 , 0.50 ] e i 2 [ 0.04 , 0.21 ] π ) , ( ( v , y ) , [ 0.19 , 0.35 ] e i 2 [ 0 , 0.16 ] π ) , ( ( v , z ) , [ 0.39 , 0.55 ] e i 2 [ 0 , 0.16 ] π ) } .  
Definition 7.
Ref. [22] An intuitionistic fuzzy set (IFS)  in a universe  Տ is of the following form
= { ( x , ḿ ( x ) , ( x ) ) : x Տ }
where  ḿ : [ 0 ,   1 ]  and  : [ 0 ,   1 ] are mappings called the degree of membership and degree of non-membership, respectively, given that 0 ḿ ( x ) + ( x ) 1 .
Example 6.
= { ( u , 0.86 , 012 ) , ( w , 0.47 , 0.36 ) , ( x , 0.34 , 0.59 ) , ( y , 0.61 , 0.28 ) , ( z , 0.16 , 0.73 ) } is an IFS.
Definition 8.
Ref. [25] A complex intuitionistic fuzzy set (CIFS)  in a universe  Տ is of the following form
= { ( x , ḿ ( x ) , ( x ) ) : x Տ }
where  ḿ : Z  and  : Z   0 | Z | 1  and  Z  is a complex number. The mappings ḿ  and  are called degree of membership and degree of non-membership, respectively, given that  0 | ḿ ( x ) | + | ( x ) | 1 . Equivalently, the CIFS can also be represented in the following form
= { ( x , α ḿ ( x ) e i 2 ρ ḿ ( x ) π , α ( x ) e i 2 ρ ( x ) π ) : x Տ }
where  α ḿ : [ 0 ,   1 ] , α : [ 0 ,   1 ] , ρ ḿ : [ 0 ,   1 ]  and  ρ : [ 0 ,   1 ] are mappings called amplitude term of degree of membership, amplitude term of degree of non-membership, phase term of degree of membership and phase term of degree of non-membership and i = 1 , given that  0 α ḿ ( x ) + α ( x ) 1  and  0 ρ ḿ ( x ) + ρ ( x ) 1 .
Example 7.
= { ( w , 0.35 e i 2 ( 0.42 ) π , 0.26 e i 2 ( 0.31 ) π ) , ( x , 0.51 e i 2 ( 0.16 ) π , 0.38 e i 2 ( 0.84 ) π ) , ( y , 0.71 e i 2 ( 0.22 ) π , 0.19 e i 2 ( 0.49 ) π ) , ( z , 0.09 e i 2 ( 0.17 ) π , 0.03 e i 2 ( 0.75 ) π ) } is a CIFS.
Definition 9.
Ref. [26] An interval-valued complex intuitionistic fuzzy set (IVCIFS)   in a universe Տ is of the following form
= { ( x , [ ḿ ( x ) , ḿ + ( x ) ] , [ ( x ) , C + ( x ) ] ) : x Տ }
where  ḿ : Z ,  ḿ + : Z ,  : Z  and  + : Z   0 | Z | 1  and  Z  is a complex number. The mappings ḿ  and  ḿ +  are called the lower and upper degrees of membership, respectively, while the mappings   and  are called the lower and upper degrees of non-membership, respectively, given that 0 | ḿ + ( x ) | + | + ( x ) | 1 . Equivalently, the IVCIFS can also be represented in the following form
= { ( x , [ α ḿ ( x ) , α ḿ + ( x ) ] e i 2 [ ρ ḿ ( x ) , ρ ḿ + ( x ) ] π , [ α ( x ) , α + ( x ) ] e i 2 [ ρ ( x ) , ρ + ( x ) ] π ) : x Տ }
where  α ḿ : [ 0 ,   1 ] , α ḿ + : [ 0 ,   1 ] ,  ρ ḿ : [ 0 ,   1 ] ,  ρ ḿ + : [ 0 ,   1 ]  and  α : [ 0 ,   1 ] ,  α + : [ 0 ,   1 ] ,  ρ : [ 0 ,   1 ] ,  ρ + : [ 0 ,   1 ] are mappings called the lower amplitude term, upper amplitude term, lower phase term, upper phase term of degree of membership and lower amplitude term, upper amplitude term, lower phase term, upper phase term of degree of non-membership, respectively, i = 1 . Given that  0 α ḿ + + α + 1  and  0 ρ ḿ + + ρ + 1 .
Example 8.
= { ( w , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.32 , 0.42 ] π ) , ( x , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( y , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) ( z , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) } is an IVCIFS.

3. Interval-Valued Complex Fuzzy Relations

This section introduces the novel concepts of the Cartesian product of two interval-valued complex intuitionistic fuzzy sets (IVCIFSs), an interval-valued complex intuitionistic fuzzy relation (CIVIFR) and its types. For each definition a suitable example is given. Moreover, some interesting results for IVCIFRs have also been proved.
Definition 10.
Let  = { ( x , [ α ( ) ḿ ( x ) , α ( ) ḿ + ( x ) ] e i 2 [ ρ ( ) ḿ ( x ) , ρ ( ) ḿ + ( x ) ] π , [ α ( ) ( x ) , α ( ) + ( x ) ] e i 2 [ ρ ( ) ( x ) , ρ ( ) + ( x ) ] π ) : x Տ } and = { ( y , [ α ( ) ḿ ( y ) , α ( ) ḿ + ( y ) ] e i 2 [ ρ ( ) ḿ ( y ) , ρ ( ) ḿ + ( y ) ] π , [ α ( ) ( y ) , α ( ) + ( y ) ] e i 2 [ ρ ( ) ( y ) , ρ ( ) + ( y ) ] π ) : y Տ }  be two IVCFSs in a universe  Տ , then their Cartesian product is given as
× = { ( ( x , y ) , [ α ( × ) ḿ ( x , y ) , α ( × ) ḿ + ( x , y ) ] e i 2 [ ρ ( × ) ḿ ( x , y ) , ρ ( × ) ḿ + ( x , y ) ] π , [ α ( × ) ( x , y ) , α ( × ) + ( x , y ) ] e i 2 [ ρ ( × ) ( x , y ) , ρ ( × ) + ( x , y ) ] π ) : x , y }
where  α ( × ) ḿ ( x , y ) = min { α ( ) ḿ ( x ) , α ( ) ḿ ( y ) } ,  α ( × ) ḿ + ( x , y ) = min { α ( ) ḿ + ( x ) , α ( ) ḿ + ( y ) } ρ ( × ) ḿ ( x , y ) = min { ρ ( ) ḿ ( x ) , ρ ( ) ḿ ( y ) }  and  ρ ( × ) ḿ + ( x , y ) = min { ρ ( ) ḿ + ( x ) , ρ ( ) ḿ + ( y ) } and  α ( × ) ( x , y ) = max { α ( ) ( x ) , α ( ) ( y ) } , α ( × ) + ( x , y ) = max { α ( ) + ( x ) , α ( ) + ( y ) } ρ ( × ) ( x , y ) = max { ρ ( ) ( x ) , ρ ( ) ( y ) }  and  ρ ( × ) + ( x , y ) = max { ρ ( ) + ( x ) , ρ ( ) + ( y ) } .
Definition 11.
The interval-valued complex intuitionistic fuzzy relation (IVCIFR) is a subset of the Cartesian product of any two IVCIFSs, i.e., × , where and   are IVCIFSs and  denotes the IVCIFR.
Example 9.
The Cartesian product of two IVCFSs
= { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }   and
= { ( x , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( y , [ 0.52 , 0.58 ] e i 2 [ 0.30 , 0.42 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.06 , 0.13 ] π ) , ( z , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.32 , 0.42 ] π ) , }   is
× = { ( ( u , x ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , y ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( u , z ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , y ) , [ 0.52 , 0.58 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( w , y ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) }
The IVCIFR between the IVCFSs and is
= { ( ( u , y ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , y ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) }
The IVCIFR Ṝ between the IVCFSs Ḝ and Ḟ is given as below (Figure 1),
NOTE: 
For convenience, throughout this article, x and ( x , y ) will be used to denote ( x , [ α ( ) ḿ ( x ) , α ( ) ḿ + ( x ) ] e i 2 [ ρ ( ) ḿ ( x ) , ρ ( ) ḿ + ( x ) ] π , [ α ( ) ( x ) , α ( ) + ( x ) ] e i 2 [ ρ ( ) ( x ) , ρ ( ) + ( x ) ] π ) and ( ( x , y ) , [ α ( × ) ḿ ( x , y ) , α ( × ) ḿ + ( x , y ) ] e i 2 [ ρ ( × ) ḿ ( x , y ) , ρ ( × ) ḿ + ( x , y ) ] π , [ α ( × ) ( x , y ) , α ( × ) + ( x , y ) ] e i 2 [ ρ ( × ) ( x , y ) , ρ ( × ) + ( x , y ) ] π ) , respectively, otherwise it will be mentioned.
Definition 12.
Let be an IVCIFS in a universe Տ  and   be an IVCIFR on  . Then,
  •  is known as an IVCI reflexive fuzzy relation (IVCI-reflexive-FR) on   if  ( x , x ) , x .
  •  is known as an IVCI irreflexive fuzzy relation (IVCI-irreflexive-FR) on  if  ( x , x ) ,  x .
  • is known as an IVCI symmetric fuzzy relation (IVCI-symmetric-FR) on  if x , y ,  ( x , y ) ( y , x ) .
  • is known as an IVCI antisymmetric fuzzy relation (IVCI-antisymmetric-FR) on if x , y , ( x , y ) and ( y , x ) x = y .
  •  is known as an IVCI asymmetric fuzzy relation (IVCI-asymmetric-FR) on if x , y , ( y , x ) ( x = y ) .
  • is known as an IVCI complete fuzzy relation (IVCI-complete-FR) on if x , y , ( x , y ) or (y, x) ∈ Ṝ.
  • is known as an IVCI transitive fuzzy relation on (IVCI-transitive-FR) if x , y , z , (x,y) ∈ Ṝ and ( y , z ) ( x , z ) .
  • is known as an IVCI equivalence fuzzy relation (IVCI-equivalence-FR) on ifis IVCI-reflexive-FR, IVCI-symmetric-FR and IVCI-transitive-FR on Ḝ.
  • is known as an IVCI preorder fuzzy relation (IVCI-preorder-FR) on if is IVCI-reflexive-FR and IVCI-transitive-FR on   .
  • is known as an IVCI strict order fuzzy relation (IVCI-strict order-FR) on if is IVCI-irreflexive-FR and IVCI-transitive-FR on   .
  • is known as an IVCI partial order fuzzy relation (IVCI-partial order-FR) on if is IVCI-preorder-FR and IVCI-antisymmetric-FR on   .
  • is known as an IVCI linear order fuzzy relation (IVCI-linear order-FR) on if is IVCI-partial order-FR and IVCI-complete-FR on   .
Example 10.
For an IVCIFS  = { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) } the Cartesian product  × is
× = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , v ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( u , w ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , v ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
Then,
  • The IVCI-equivalence-FR 1 on is given as
    1 = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , w ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
  • The IVCI-preorder-FR 2 on is given as
    2 = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
  • The IVCI-strict order-FR 3 on is given as
    3 = { ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , v ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) }
  • The IVCI-partial order-FR 4 on is given as
    4 = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
  • The IVCI-linear order-FR 5 on is given as
    5 = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , v ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
Definition 13.
For an IVCIFR  , the converse relation  c  of   is defined as,  c = { ( y , x ) : ( x , y ) } .
Example 11.
If = { ( ( u , y ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , y ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) } is an IVCIFR between IVCIFSs  = { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) } and = { ( x , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( y , [ 0.52 , 0.58 ] e i 2 [ 0.30 , 0.42 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.06 , 0.13 ] π ) , ( z , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.32 , 0.42 ] π ) , } , then the converse relation  c  of is
c = { ( ( x , v ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( y , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( y , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( z , v ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( z , w ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) }
The IVCI-equivalence-FRs sets off the concept of IVCIF-equivalences classes, which are defined as follows.
Definition 14.
For an IVCI-equivalence-FR  , the IVCIF equivalence class of  x  modulo  is defined as,  [ x ] = { y | ( y , x ) } .
Example 12.
If = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , w ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , } is an IVCIFR on an IVCIFS  = { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) } , then the IVCIF-equivalences class of
  • x  modulo  is given as
    [ u ] = { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
  • y  modulois given as
    [ v ] = { ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) }
  • z  modulo  is given as
    [ w ] = { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) }
Definition 15.
For an IVCIFR  on an IVCIFS  , then the IVCI-composite-FR   is defined as: for each  ( x , y )  and  ( y , z ) ( x , z ) ,  x , y , z Տ .
Example 13. 
For some IVCIFRs
1 = { ( ( u , v ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , v ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) } and
2 = { ( ( u , w ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , v ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) } on an IVCIFS.
= { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) } , then the IVCI-composite-FR 1 2 is given as,
1 2 = { ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( v , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , }
Theorem 1.
An IVCIFR is an IVCI-symmetric-FR on an IVCIFS iff = c .
Proof. 
Assume that = c , then
( u , v ) ( v , u ) c ( v , u ) .
Thus, is an IVCI-symmetric-FR on an IVCIFS .
Conversely, suppose that is an IVCI-symmetric-FR on an IVCIFS , then
( u , v ) ( v , u ) .
However, ( v , u ) c = c . □
Theorem 2.
An IVCIFR is an IVCI-transitive-FR on an IVCIFS i f f   .
Proof. 
Assume that is an IVCI-transitive-FR on an IVCIFS .
Let ( u , w ) ,
Then, by the definition of IVCI-transitivity-FR,
( u , v ) and ( v , w ) ( u , w ) .
Conversely assume that , then
for ( u , v ) and ( v , w ) ( u , w ) ( u , w ) .
Thus, is an IVCI-transitive-FR on . □
Theorem 3.
Suppose is an IVCI-equivalence-FR on an IVCIFS , then = .
Proof. 
Assume that ( u , v ) ,
then by the definition of IVCI-symmetric-FR,
( v , u ) .
Now, by using the definition of IVCI-transitive-FR,
( u , u ) .
However, by the definition of IVCI-composite-FR,
( u , u ) .
Thus,
Conversely, assume that ( u , v ) , then   w S ( u , w ) and ( w , v ) .
However, it is given that is an IVCI-equivalence-FR on , so is also an IVCI-transitive-FR. Therefore,
( u , v )
Thus, by (1) and (2),
= . □
Theorem 4.
Suppose is an IVCI-partial order-FR on an IVCIFS , then the converse relation c of is also an IVCI-partial order-FR on .
Proof. 
In order to prove the assertion, it is sufficient to show that the converse of a complex intuitionistic partial order fuzzy relation R c satisfies the three properties of a complex intuitionistic partial order fuzzy relation.
By using the properties of IVCI-partial order-FR , we prove the statement.
  • It is given that is an IVCI-reflexive-FR. Therefore, for any u S ,
    ( u , u ) ( u , u ) c .
    Thus, c is an IVCI-reflexive-FR.
  • Assume that ( u , u ) c  and ( v , u ) c ,
    then, ( u , v ) and ( v , u ) .
    However, is an IVCI-antisymmetric-FR. Therefore, ( u , v ) = ( v , u ) .
    Thus, is also an IVCI-antisymmetric-FR.
  • Suppose that ( u , v ) c and ( v , w ) c ,
    then, ( w , v ) and ( v , u ) .
    However, it is given that is an IVCI-transitive-FR. Therefore,
    ( w , u ) ( u , w ) c .
    Thus, c is also an IVCI-transitive-FR.
From i, ii and iii, the converse relation c of an IVCI-partial order-FR is proved to be an IVCI-partial order-FR too. □
Theorem 5.
Suppose is an IVCI-equivalence-FR on an IVCIFS , then ( x , y ) ,   i f f   [ u ] = [ v ] .
Proof. 
Assume that ( u , v ) and w [ u ] ( w , u ) .
Now, by using the fact that an IVCI-equivalence-FR is also an IVCI-transitive-FR, so
( w , v ) w [ v ] .
Thus,
[ u ] R [ v ]
As ( u , v ) , by using the fact that an IVCI-equivalence-FR is also an IVCI-symmetric-FR, so
( v , u ) .
Additionally, assume that w [ v ] ( w , v ) .
Now, again by using the fact that an IVCI-equivalence-FR is also an IVCI-transitive-FR, so
( w , u ) w [ u ] .
Thus,
[ v ] [ u ]
Therefore, (3) and (4) infer that [ v ] = [ u ] .
Conversely, assume that [ v ] = [ u ] , w [ u ] and w [ v ] ( w , v ) and ( w , u ) .
Again, by using the fact that an IVCI-equivalence-FR is also an IVCI-symmetric-FR, so
( w , u ) ( u , w ) .
Now, by the definition of IVCI-transitive-FR,
( u , w ) and ( w , v ) ( u , v ) ,
which completes the proof. □

4. Hasse Diagram for IVCI-Partial Order-FRs

In this section, the Hasse diagram for IVCI-partial order-FR is defined. Moreover, some important ideas related to Hasse diagrams, such as maximum element, minimum element, maximal element, minimal element, supremum, infimum, upper and lower bounds, are defined.
Definition 16.
The graphical representation of an IVCI-partial order-FS is called the Hasse diagram. The diagram is made up of dots and lines, which are called the vertices and edges, respectively. Each vertex represents an element of an IVCI-partial order-FS, while each edge represents a relationship between some pair of these elements. There are certain rules in the construction of a Hasse diagram, that are discussed below:
  • The elements are arranged in an ascending order to distinguish the lower ranks and higher ranks. In an ordered pair of an IVCI-partial order-FR, the preceding element is considered to be smaller than the element appearing second in the pair. For example, in the ordered pair ( t , x ) , the element t is smaller than the element x . t  will appear higher than  x in the diagram.
  • There are no self-loops for IVCI-reflexive-FRs. In a Hasse diagram, the self-relation is not represented by any edge, it is just assumed to be there.
  • There are no directional edges. The directional edges indicate the order of the element in the ordered pair. For example, in the ordered pair ( t , x ) , the relation in normal diagrams, would be represented by a directional edge with an arrow head pointing towards element x . Thus, ranking  x  higher than  t . But in a Hasse diagram, the stepwise ascending arrangement of the elements automatically distinguishes the higher ranked and lower ranked elements.
  • There are no redundant edges, for instance the edge for an IVCI-transitive-FRs and IVCI-reflexive-FRs. Consider ( t , x )  and then IVCI-transitive-FR  ( t , k ) . In normal diagrams, there would be three edges representing the above three relations. However, in a Hasse diagram, only two edges are constructed, i.e., from t  to  x  and another from to  k . The indirect link between  t  and  k  via x is represented by the two edges. The IVCI-transitive-FR is intuitively understood.
Example 14.
Consider an IVCIFS
= { ( u , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( v , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( w , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( x , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( y , [ 0.52 , 0.58 ] e i 2 [ 0.30 , 0.42 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.06 , 0.13 ] π ) , ( z , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.32 , 0.42 ] π ) , } in a universe S . The Cartesian product  × is
× = [ ( ( u , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , v ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( u , w ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) ( ( u , x ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , y ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( u , z ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , y ) , [ 0.52 , 0.58 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( w , v ) , [ 0.37 , 0.46 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( w , y ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( x , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , v ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( x , w ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , y ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , z ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( y , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( y , v ) , [ 0.52 , 0.58 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( y , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( y , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( y , y ) , [ 0.52 , 0.58 ] e i 2 [ 0.30 , 0.42 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.06 , 0.13 ] π ) , ( ( y , z ) , [ 0.26 , 0.34 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( z , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( z , v ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( z , w ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( z , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( z , y ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( z , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.32 , 0.42 ] π ) ]
An IVCI-partial order-FR is
= { ( ( u , v ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( u , y ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( u , z ) , [ 0.07 , 0.12 ] e i 2 [ 0.24 , 0.29 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.57 , 0.71 ] π ) , ( ( v , v ) , [ 0.63 , 0.71 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.11 , 0.23 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( v , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( w , w ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , y ) , [ 0.37 , 0.46 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.32 , 0.43 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( w , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.53 , 0.68 ] π ) , ( ( x , u ) , [ 0.07 , 0.12 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.56 , 0.66 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , v ) , [ 0.26 , 0.34 ] e i 2 [ 0.03 , 0.15 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.73 , 0.82 ] π ) , ( ( x , w ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , x ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , y ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( x , z ) , [ 0.26 , 0.34 ] e i 2 [ 0.15 , 0.25 ] π , [ 0.38 , 0.49 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( y , y ) , [ 0.52 , 0.58 ] e i 2 [ 0.30 , 0.42 ] π , [ 0.18 , 0.37 ] e i 2 [ 0.06 , 0.13 ] π ) , ( ( y , z ) , [ 0.26 , 0.34 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.63 , 0.74 ] π ) , ( ( z , z ) , [ 0.28 , 0.36 ] e i 2 [ 0.43 , 0.53 ] π , [ 0.48 , 0.61 ] e i 2 [ 0.32 , 0.42 ] π ) }
Figure 2 depicts the Hasse diagram of the IVCI-partial order-FR .
Definition 17.
Suppose that an IVCI-partial order-FR is represented by a Hasse diagram, then an element is known as:
  • The maximal element if it appears at the top of the diagram.
  • The minimal if it appears at the bottom of the diagram.
  • The maximum or greatest element if every element related to it is smaller than it.
  • The minimum or least element if every element related to it is greater than it.
Definition 18.
Supposebe the subset of an IVCI-partial order-FS  , then an element  x × is known as the:
  • Upper bound of Ḟ if  ( v , u ) ,   v .
  • Lower bound ofif  ( u , v ) ,   v .
  • Supremum ofif it is the least upper bound of Ḟ.
  • Infimum ofif it is the greatest upper bound of Ḟ.
Example 15.
Assume that  = { f , g , h , k , l , o , p , q , r , s , t , u } is a complex intuitionistic partial order fuzzy set  . For ease, we close your eyes to the degree of membership and degree of non-membership. Figure 3 is the illustration of the Hasse diagram of set .
In the above diagram,
  • Maximal element is k .
  • Minimal element is t .
  • Maximum elements are k and p .
  • Minimum elements are q and t .
Now considering a subset = { g , h , o , u } of set whose elements are enclosed in the green oval.
e.
Upper bounds of are h and k .
f.
Lower bounds of are u and t .
g.
Supremum of is h .
h.
Infimum of is u .

5. Application

As the name suggests, in this section the applications of the proposed concepts are presented. We applied the introduced relations and their different types in the fields of computer technology, more precisely: cybersecurity and cybercrime in the industrial control system (ICS).

5.1. Security Measures

Over the past few decades, the automation of industrial systems has been steadily gaining momentum. Business demands continuous improvements in the efficiency of the production process, thus, the depth of IT penetration and system connectivity grows continuously; industrial facilities are connected to corporate networks and are frequently managed remotely over the network. However, along with their benefits, these new technologies have brought new threats into the world of industrial automation, and these new threats came as a surprise. The Industrial Control Systems (ICS) in place today were designed to operate for decades, and many of them were developed without any serious regard to IT security.
The stable operation of today’s industrial networks can be disrupted, not only by a failure at a production unit or an operator’s error but also by a software error, an accidental infection of workstations with malware or a deliberate cybercriminal attack.
Some security measures are given below. Figure 4 portrays the flowchart for the process being followed in the application.
I. 
Default-deny as a standard policy: In default-deny mode, the ICS works in a protected environment that only allows programs to run that are required for the technological process to function. All unknown and unwanted applications, including malicious programs, are blocked. Thus, a secure running environment is created with minimum load on system resources.
II. 
Proactive protection against unknown malicious programs and automatic protection against exploits. The technology scans executable programs, assessing the security of each application by monitoring its activities when in operation.
III. 
Device Control technology helps to manage removable devices (USB storages, GPRS modems, smartphones, USB network cards) and creates limited lists of permitted devices and the users who can access them.
IV. 
All-in-one IT security console helps to monitor and control all solutions to ensure IT security. With the single management console, admins can install, configure and manage security, and access reports.
V. 
Integration with SIEM (using special connectors) allows admins to export information about security incidents at protected nodes of the technological network into the corporate SIEM system.
The above security measures are abbreviated and assigned degrees of membership and degrees of non-membership values. Table 1 contains the details of their abbreviations and values of degrees.

5.2. Sources of Code Penetration

In a computer system there are certain weaknesses. Cybercriminals are always looking for opportunities. They inject their codes using media that are sources of code penetration. Following are the eight sources of code penetration:
  • Mobile Devices
  • Via USB Ports
  • Via Remote Access
  • Wi-Fi
  • HMI Interface
  • Internet Connections
  • Outside Contractors
  • Via Corporate Networks
Table 2 contains the details of the above sources such as the abbreviations used in calculations and the degree of membership and degree of non-membership.

5.3. Calculations

Next, the relationships are analyzed, i.e., the effectiveness and ineffectiveness of each cybersecurity method against every cybercrime. We carry out the following mathematics.
We present the following two IVCIFSs and representing the set of securities and the set of sources of threats, respectively.
= { ( D D , [ 0.550 , 0.600 ] e i 16 [ 0.500 , 0.750 ] π , [ 0.300 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π ) , ( P P , [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.250 ] π ) , ( D C T , [ 0.375 , 0.525 ] e i 16 [ 0.438 , 0.563 ] π , [ 0.200 , 0.350 ] e i 16 [ 0.188 , 0.250 ] π ) , ( I T S C , [ 0.400 , 0.500 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.250 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π ) , ( S I E M , [ 0.300 , 0.375 ] e i 16 [ 0.563 , 0.613 ] π , [ 0.275 , 0.325 ] e i 16 [ 0.188 , 0.313 ] π ) }
= { ( M D , [ 0.275 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0 , 313 ] π ) , ( U S B , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π , [ 0.275 , 0.325 ] e i 16 [ 0.125 , 0.250 ] π ) , ( R A , [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.325 , 0.350 ] e i 16 [ 0.188 , 0.313 ] π ) , ( W i F i , [ 0.450 , 0.550 ] e i 16 [ 0.313 , 0.500 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.250 ] π ) , ( H M I , [ 0.300 , 0.375 ] e i 16 [ 0.438 , 0.563 ] π , [ 0.200 , 0.300 ] e i 16 [ 0.063 , 0.188 ] π ) , ( I C , [ 0.475 , 0.575 ] e i 16 [ 0.500 , 0.613 ] π , [ 0.250 , 0.350 ] e i 16 [ 0.125 , 0.313 ] π ) , ( O C , [ 0.500 , 0.550 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.225 , 0.300 ] e i 16 [ 0.063 , 0.250 ] π ) , ( C N , [ 0.200 , 0.475 ] e i 16 [ 0.313 , 0.613 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.188 ] π ) }
To find out the efficacy of certain security measures against particular sources of code penetration, we use the Cartesian product. Thus, finding the Cartesian product between the IVCIFSs and
= × = [ ( ( D D , M D ) , [ 0.275 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0313 ] π ) , ( ( D D , U S B ) , [ 0.375 , 0.450 ] e i 16 [ 0.2500.375 ] π , [ 0.300 , 0.400 ] e i 16 [ 0.125 , 031 : 3 ] π ) , ( ( D D , R A ) , [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( D D , W i F i ) , [ 0.450 , 0.550 ] e i 16 [ 0.313 , 0.500 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( D D , H M I ) , [ 0.300 , 0.375 ] e i 16 [ 0.438 , 0.563 ] π , [ 0.300 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π ) , ( ( D D , I C ) , [ 0.475 , 0.575 ] e i 16 [ 0.500 , 0.613 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π ) , ( ( D D , O C ) , [ 0.500 , 0.550 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.300 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π ) , ( ( D D , C N ) , [ 0.200 , 0.475 ] e i 16 [ 0.313 , 0.613 ] π , [ 0.300 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π ) , ( ( P P , M D ) , [ 0.275 , 0.375 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( P P , U S B ) , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π , [ 0.275 , 0.375 ] e i 16 [ 0.125 , 0.250 ] π ) , ( ( P P , R A ) , [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.325 , 0.375 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( P P , W i F i ) , [ 0.450 , 0.525 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.250 ] π ) , ( ( P P , H M I ) , [ 0.300 , 0.375 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.250 ] π ) , ( ( P P , I C ) , [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.313 ] π ) , ( ( P P , O C ) , [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0250 ] π ) , ( ( P P , C N ) , [ 0.200 , 0.475 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.188 ] π ) , ( ( D C T , M D ) , [ 0.275 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( D C T , U S B ) , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π , [ 0.275 , 0.350 ] e i 16 [ 0.188 , 0.250 ] π ) , ( ( D C T , R A ) , [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.325 , 0.350 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( D C T , W i F i ) , [ 0.375 , 0.525 ] e i 16 [ 0.313 , 0.500 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.250 ] π ) , ( ( D C T , H M I ) , [ 0.300 , 0.375 ] e i 16 [ 0.438 , 0.563 ] π , [ 0.200 , 0.350 ] e i 16 [ 0.188 , 0.250 ] π ) , ( ( D C T , I C ) , [ 0.375 , 0.525 ] e i 16 [ 0.438 , 0.563 ] π , [ 0.250 , 0.350 ] e i 16 [ 0.125 , 0.313 ] π ) , ( ( D C T , O C ) , [ 0.375 , 0.525 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.225 , 0.350 ] e i 16 [ 0.188 , 0.250 ] π ) , ( ( D C T , C N ) , [ 0.200 , 0.475 ] e i 16 [ 0.313 , 0.563 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.188 , 0.250 ] π ) , ( ( I T S C , M D ) , [ 0.275 , 0.375 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , U S B ) , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π , [ 0.275 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , R A ) , [ 0.350 , 0.400 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.325 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , W i F i ) , [ 0.400 , 0.500 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , H M I ) , [ 0.300 , 0.375 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.250 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , I C ) , [ 0.400 , 0.500 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.250 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , O C ) , [ 0.400 , 0.500 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.250 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( I T S C , C N ) , [ 0.200 , 0.475 ] e i 16 [ 0.313 , 0.438 ] π , [ 0.250 , 0.375 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( S I E M , M D ) , [ 0.275 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0.313 ] π ) , ( ( S I E M , U S B ) , [ 0.300 , 0.375 ] e i 16 [ 0.250 , 0.375 ] π , [ 0.275 , 0.325 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( S I E M , R A ) , [ 0.300 , 0.375 ] e i 16 [ 0.375 , 0.438 ] π , [ 0.325 , 0.350 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( S I E M , W i F i ) , [ 0.300 , 0.375 ] e i 16 [ 0.313 , 0.500 ] π , [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( S I E M , H M I ) , [ 0.300 , 0.375 ] e i 16 [ 0.438 , 0.563 ] π , [ 0.275 , 0.3250 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( S I E M , I C ) , [ 0.300 , 0.375 ] e i 16 [ 0.500 , 0.613 ] π , [ 0.275 , 0.350 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( S I E M , O C ) , [ 0.300 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π , [ 0.275 , 0.325 ] e i 16 [ 0.188 , 0.313 ] π ) , ( ( S I E M , C N ) , [ 0.200 , 0.375 ] e i 16 [ 0.313 , 0.613 ] π , [ 0.275 , 0.375 ] e i 16 [ 0.188 , 0.313 ] π ) ]
Every member of × is an order pair, which characterizes the connection between that pair, i.e., the influences and impacts of the first parameter on the second, in an ordered pair. The degrees of membership indicate the efficacy of a security measure to overcome a particular source of vulnerability with respect to time. In contrast, the degrees of non-membership give the inefficiency or ineptness of a certain security measure against a specific source of threat injection. For instance, the ordered pair ( ( D D , I C ) , [ 0.475 , 0.575 ] e i 16 [ 0.500 , 0.613 ] π , [ 0.350 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π ) expresses that the default-deny mode can successfully tackle the risks incoming through internet connections. Further, the numbers explain that the level of inefficiency is low. More specifically, the degree values are translated as: the grade of security that a default-deny mode provides against the vulnerabilities injected through internet connections is 47.5% to 57.5%, with respect to 8 to 10 time units and the chances of a cyberattack via internet connections bypassing the default-deny mode is 35% to 40%, with respect to 2 to 5 time units. As far as the security is concerned, the longer duration of time in the degree of membership is considered better, while the smaller time frame in the degree of non-membership is better.

5.4. Cyber-Security Techniques and Practices

An industry’s digital system faces threats of all shapes and sizes. Thus, they should be ready to defend, identify and respond to a full range of attacks. The security strategy needs to be able to address the various methods these cybercriminals might employ. The process of the method is depicted in Figure 5.
Following are fourteen different security practices and techniques:
I. 
Access control ( A C )
If the cyberattacker is unable to access your industrial network, then they will do very limited harm. A C limits user access according to their responsibilities, which increases the security, and especially, internal breaches are restricted.
( A C , [ 0.455 , 0.575 ] e i [ 0.305 , 0.540 ] π , [ 0.100 , 0.180 ] e i [ 0.009 , 0.270 ] π )
II. 
Anti-malware software ( A M S )
Viruses, Trojans, worms, key-loggers and spyware are all malwares, which are used to infect digital systems. Anti-malware software identifies risky programs and files, then prevents them from spreading.
( A M S , [ 0.560 , 0.610 ] e i [ 0.350 , 0.460 ] π , [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π )
III. 
Anomaly detection ( A D )
Identifying anomalies is a difficult task. Henceforth, anomaly detection engines (ADE) are designed that allow the analysis of an industrial network. This alerts the authorities when breaches occur so that they can respond at the right times.
( A D , [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π , [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π )
IV. 
Application security ( A S )
An A S establishes security parameters for any applications that are relevant to industrial security.
( A S , [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π , [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π )
V. 
Data loss prevention (DLP)
D L P equipment and strategies protect employees and users from ill-use, such as giving away sensitive data.
( D L P , [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π , [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π )
VI. 
Email security ( E S )
An E S system basically identifies risky emails. These phishing emails are usually very convincing because their target is to trick people. Further, this system also stops cyberattacks and prevents the sharing of important data.
( E S , [ 0.405 , 0.505 ] e i [ 0.650 , 0.780 ] π , [ 0.050 , 0.100 ] e i [ 0.060 , 0.100 ] π )
VII. 
Endpoint security ( E P S )
These days, the difference between personal and business devices is nearly non-existent. Unfortunately, personal devices are targeted to attack businesses. Endpoint security is a defensive layer between business networks and such remote devices.
( E P S , [ 0.375 , 0.440 ] e i [ 0.350 , 0.450 ] π , [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π )
VIII. 
Firewalls ( F W )
F W act as gateways in a network, used to secure the borders between the internet and local networks. They are used to manage network traffic by allowing approved traffic and blocking non-authorized traffic.
( F W , [ 0.450 , 0.530 ] e i [ 0.500 , 0.580 ] π , [ 0.220 , 0.290 ] e i [ 0.130 , 0.210 ] π )
IX. 
Intrusion prevention systems ( I P S )
Different types of cyberattacks are identified and then rapidly responded to by   I P S after scanning and analyzing the traffic. These systems use databases of well-known cyberattack approaches; therefore, they immediately recognize threats.
( I P S , [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π )
X. 
Network segmentation ( N S )
N S restricts the traffic from suspicious sources that carries risky threats, and allows the authorized and right traffic.
( N S , [ 0.500 , 0.580 ] e i [ 0.400 , 0.500 ] π , [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π )
XI. 
Security information and event management (SIEM)
S I E M is a field of cyber-security that provides instantaneous analysis of security warnings spawned by applications and network hardware.
( S I E M , [ 0.500 , 0.600 ] e i [ 0.650 , 0.700 ] π , [ 0.040 , 0.080 ] e i [ 0.050 , 0.120 ] π )
XII. 
Virtual private network (VPN)
The communication between secure networks and an endpoint device is authenticated by using V P N tools. They block other parties from spying by creating an encrypted line.
( V P N , [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π , [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π )
XIII. 
Web security ( W S )
W S is an extensive word that describes the security measures taken by businesses to ensure a harmless web experience when connected to an internal network. This prevents web-based cyberthreats from using browsers as access points to get into the network.
( W S , [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π , [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π )
XIV. 
Wireless security ( W i S )
Traditional networks are generally more secure than wireless networks. Thus, severe types of W i S measures are essential to certify that cybercriminals are not gaining access.
( W i S , [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π , [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π )
XV. 
Encryption ( E )
The encryption of data is an exceptionally effective security technique. The term “encryption” means the transformation of data to a code language or cipher text that cannot be read by a human. Special keys are used to decrypt these codes and cipher text back to a readable format. The complex encryption algorithms keep the information safe. Some of these algorithms are; Twofish algorithm, Rivest–Shamir–Adleman (RSA) algorithm and triple data encryption algorithm. Figure 6 illustrates the process of data encryption.
( E , [ 0.650 , 0.810 ] e i [ 0.660 , 0.790 ] π , [ 0.085 , 0.190 ] e i [ 0.040 , 0.130 ] π )
Let us assign the degree of membership and the degree of non-membership to each of the security measures and construct an IVCIFS
= { ( A C , [ 0.455 , 0.575 ] e i [ 0.305 , 0.540 ] π , [ 0.100 , 0.180 ] e i [ 0.009 , 0.270 ] π ) , ( A M S , [ 0.560 , 0.610 ] e i [ 0.350 , 0.460 ] π , [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π ) , ( A D , [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π , [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π ) , ( A S , [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π , [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π ) , ( D L P , [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π , [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π ) , ( E , [ 0.650 , 0.810 ] e i [ 0.660 , 0.790 ] π , [ 0.085 , 0.190 ] e i [ 0.040 , 0.130 ] π ) , ( E S , [ 0.405 , 0.505 ] e i [ 0.650 , 0.780 ] π , [ 0.050 , 0.100 ] e i [ 0.060 , 0.100 ] π ) , ( E P S , [ 0.375 , 0.440 ] e i [ 0.350 , 0.450 ] π , [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π ) , ( F W , [ 0.450 , 0.530 ] e i [ 0.500 , 0.580 ] π , [ 0.220 , 0.290 ] e i [ 0.130 , 0.210 ] π ) , ( I P S , [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π ) , ( N S , [ 0.500 , 0.580 ] e i [ 0.400 , 0.500 ] π , [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π ) , ( S I E M , [ 0.500 , 0.600 ] e i [ 0.650 , 0.700 ] π , [ 0.040 , 0.080 ] e i [ 0.050 , 0.120 ] π ) , ( V P N , [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π , [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π ) , ( W S , [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π , [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π ) , ( W i S , [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π , [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π ) , }
Table 3 contains the descriptions of an interval-valued complex intuitionistic partial order-FR that is obtained from the CP × .
Figure 7 portrays the Hasse diagram for the above interval-valued complex intuitionistic partial order fuzzy relation. For ease, the degrees of membership and non-membership are kept hidden in the following diagram of . In Figure 7, one can clearly tell that the best security technique of these fourteen tools is the   S I E M because it is the maximum as well as the maximal element. On the contrary side, the V P N and W S are considered to provide the least protection as they appear at the bottom of the diagram.
If we consider that an industry has to choose from among the following shortlisted security techniques because of some restrictions, these nominated security techniques and practices are listed in the following subset .
= { ( A M S , [ 0.560 , 0.610 ] e i [ 0.350 , 0.460 ] π , [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π ) , ( A D , [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π , [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π ) , ( A S , [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π , [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π ) , ( E , [ 0.650 , 0.810 ] e i [ 0.660 , 0.790 ] π , [ 0.085 , 0.190 ] e i [ 0.040 , 0.130 ] π ) , ( F W , [ 0.450 , 0.530 ] e i [ 0.500 , 0.580 ] π , [ 0.220 , 0.290 ] e i [ 0.130 , 0.210 ] π ) , ( I P S , [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π , [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π ) }
The business seeks to select the best security technique from among the shortlisted techniques in set . In order to do so, they must look out for the upper bounds and supremum. In the following diagram, the elements of are enclosed in the dark red circle. Here, the upper bounds are { E , S I E M } . The supremum is the least upper bound, therefore, encryption is the supremum in this case. Amongst the members of the subset , encryption ( E ) is the best choice for coping with the cybersecurity reasons.

6. Comparative Analysis

In this section, the reliability of the proposed framework of IVCIFRs is verified through comparing it with the pre-existing structures such as CFRs or IFRs and IVIFRs.

6.1. Comparison with FRs, CFRs, IVFRs and IVCFRs

The leading limitation of FR, CFR, IVFRs and IVCFR as compared to IVCIFRs is that these notions discuss the degrees of membership only and do not talk about the degrees of non-membership, while an IVCIFR argues about both of the degrees. Thus, an IVCIFR has the power to analyze both the strength and the weakness of any relationship.
Moreover, the complex structure of IVCIFRs can model multivariable problems, whereas the frameworks of FRs and IFRs are unable to model such problems. As an IVCFR is the greatest structure among the aforementioned contestants, so a detailed comparison between IVCIFRs and IVCFRs is given below.
We investigate the problem discussed in Section 5.3 by using IVCFRs and thinking of the following two IVCFSs and representing the set of securities and the set of sources of threats, respectively. In order to minimize the amount of calculation and to conclude the comparative analysis, some of the securities and the sources of threats are omitted.
= { ( D D , [ 0.550 , 0.600 ] e i 16 [ 0.500 , 0.750 ] π ) , ( P P , [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π ) ( S I E M , [ 0.300 , 0.375 ] e i 16 [ 0.563 , 0.613 ] π ) }
= { ( U S B , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π ) , ( R A ,   [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π ) , ( I C , [ 0.475 , 0.575 ] e i 16 [ 0.500 , 0.613 ] π ) , ( O C , [ 0.500 , 0.550 ] e i 16 [ 0.375 , 0.500 ] π ) }
Table 4 contains the details of abbreviations used in the above sets.
The IVCFR between and is
= { ( ( D D , U S B ) , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π ) , ( ( D D , R A ) , [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π ) , ( ( D D , I C ) , [ 0.475 , 0.575 ] e i 16 [ 0.500 , 0.613 ] π ) , ( ( D D , O C ) , [ 0.500 , 0.550 ] e i 16 [ 0.375 , 0.500 ] π ) , ( ( P P , U S B ) , [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π ) , ( ( P P , R A ) , [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π ) , ( ( P P , I C ) , [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π ) , ( ( P P , O C ) , [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π ) , ( ( S I E M , U S B ) , [ 0.300 , 0.375 ] e i 16 [ 0.250 , 0.375 ] π ) , ( ( S I E M , R A ) , [ 0.300 , 0.375 ] e i 16 [ 0.375 , 0.438 ] π ) , ( ( S I E M , I C ) , [ 0.300 , 0.375 ] e i 16 [ 0.500 , 0.613 ] π ) , ( ( S I E M , O C ) , [ 0.300 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π ) }
It can be seen that the above IVCFR only gives the information for the degree of membership. That is, it only gives the effectiveness of a cybersecurity technique against a source of penetration and fails to reveal the ineffectiveness of these securities versus the source of penetration’s relations because the structure of an IVCFR does not have any degree of non-membership. Hence, these structures have certain limitations and, thus, they give limited information.

6.2. Comparison with IFRs, CIFRs and IVIFRs

An IVCIFR argues about both the degree of membership and non-membership, as do the structures of IFRs, CIFRs and IVIFRs. However, IFRs and IVIFRs involve only real numbers, which limits them to single variable problems. They cannot express the problems involving time (periodic) or with phase changes.
The structure of CIFRs is based on complex numbers and, thus, consists of amplitude and phase terms. However, the advantage of an interval-valued structure of IVCIFRs over the crisp valued structure of CIFRs is that the interval represents a set, thus covering the uncertainties, including mistakes made by the person, experimental errors or computer approximations that lead to fuzziness. A detailed comparison between IVCIFRs and IVIFRs is given below.
We look to solve the problem discussed in Section 5.3 by using IVIFRs. We present the following two IVIFSs and representing the set of securities and the set of sources of threats, respectively. We omit some of the securities and the sources in order to minimize the amount of calculation. The details of abbreviations used in the following sets are in Table 4.
= { ( D D , [ 0.550 , 0.600 ] , [ 0.300 , 0.400 ] ) , ( P P , [ 0.475 , 0.525 ] , [ 0.250 , 0.375 ] ) , ( S I E M , [ 0.300 , 0.375 ] , [ 0.275 , 0.325 ] ) }
= { ( U S B , [ 0.375 , 0.450 ] , [ 0.275 , 0.325 ] ) , ( R A ,   [ 0.350 , 0.400 ] , [ 0.325 , 0.350 ] ) , ( I C , [ 0.475 , 0.575 ] , [ 0.250 , 0.350 ] ) , ( O C , [ 0.500 , 0.550 ] , [ 0.225 , 0.300 ] ) }
The IVIFR between and is
= { ( ( D D , U S B ) , [ 0.375 , 0.450 ] , [ 0.300 , 0.400 ] ) , ( ( D D , R A ) , [ 0.350 , 0.400 ] , [ 0.325 , 0.400 ] ) , ( ( D D , I C ) , [ 0.475 , 0.575 ] , [ 0.350 , 0.400 ] ) , ( ( D D , O C ) , [ 0.500 , 0.575 ] , [ 0.300 , 0.400 ] ) , ( ( P P , U S B ) , [ 0.375 , 0.450 ] , [ 0.275 , 0.375 ] ) , ( ( P P , R A ) , [ 0.350 , 0.400 ] , [ 0.325 , 0.375 ] ) , ( ( P P , I C ) , [ 0.475 , 0.525 ] , [ 0.250 , 0.375 ] ) , ( ( P P , O C ) , [ 0.475 , 0.525 ] , [ 0.250 , 0.375 ] ) , ( ( S I E M , U S B ) , [ 0.300 , 0.375 ] , [ 0.275 , 0.325 ] ) , ( ( S I E M , R A ) , [ 0.300 , 0.375 ] , [ 0.325 , 0.350 ] ) , ( ( S I E M , I C ) , [ 0.300 , 0.375 ] , [ 0.275 , 0.350 ] ) , ( ( S I E M , O C ) , [ 0.300 , 0.375 ] , [ 0.275 , 0.325 ] ) }
From the above IVCFR , it is observed that it explains the effectiveness and ineffectiveness of securities against the sources of penetration. However, unlike IVCIFR, it does not involve the time frame. We are also interested in the time durations for which certain security can successfully handle the vulnerability. Therefore, the complex valued degrees must be involved to achieve the needed information.

6.3. Cons of Alternative Methods

  • The structure of FRs, IVFRs, CFRs and IVCFRs lack the degree of non-membership.
  • The IFR, CIFR and IVIFR methods discuss the degree of membership as well as the degree of no-membership, but they have certain limitations.
    • IFR, with its single valued degrees, does not cope with uncertainty as efficiently as interval-valued structures. Moreover, it cannot model multivariable problems.
    • Though CIFR is capable of modeling multivariable problems, it lags behind in handling uncertainty due to its single valued degrees.
    • An IVIFR can grip the uncertainty quite well with its interval-valued structure, but it is only limited to one-dimensional problems.

6.4. Pros of IVCIFR

  • The structure is composed of the degrees of membership and non-membership.
  • Interval values cover the mistakes and errors made by the expert or that occur during the survey or experiments.
  • Complex valued memberships and non-memberships can be used to cope with multidimensional variables.
Table 5 provides a summary of the characteristics of eight different structures in fuzzy set and logic theory. From Table 5, the grand structure of IVCIFRs is verified as it ticks all four characteristics, while the rest of the competitors have limitations in their structures.

7. Conclusions

This article introduced the innovative concepts of interval-valued complex intuitionistic fuzzy relation (IVCIFR) and the Cartesian product (CP) between two interval-valued complex intuitionistic fuzzy sets (IVCIFSs). Further, various types of IVCIFRs are also defined, including the interval-valued complex intuitionistic equivalence fuzzy relation (IVCI-equivalence-FR), IVCI-partial order-FR, IVCI-total order-FR, IVCI-composite-FR and many more. Moreover, the Hasse diagram has been introduced for the IVCI-partial order-FR and IVCI-partial order-FS. The concepts and ideas related to the Hasse diagram have also been defined. Suitable examples are given for each of the definitions and some results are proved for the different types of IVCIFRs. Furthermore, the proposed ideas are utilized to investigate the relationships between different types of cybersecurity and cybercrimes and their sources. The section titled comparative analysis verifies the omnipotence of IVCIFRs by its head-to-head comparison with other alternative mathematical techniques. In addition, it also sums up the vast structure of IVCIFRs and the limitations of pre-existing frameworks. The flaws of IVCIFRs include the absence of a degree of abstinence as well as the restrictions and constraints on the sum of the degrees of membership and non-membership. In the future, these concepts can be extended to the generalizations of fuzzy sets, which will give rise to many interesting structures with a vast range of applications.

Author Contributions

Conceptualization, A.N., N.J., A.G. and F.R.A.; Data curation, A.N., N.J. and S.U.K.; Formal analysis, A.N., N.J., A.G., S.U.K. and F.R.A.; Funding acquisition, A.N., A.G. and F.R.A.; Investigation, A.N., N.J., A.G., S.U.K. and F.R.A.; Methodology, A.N., N.J., A.G., S.U.K. and F.R.A.; Project administration, N.J. and A.G.; Resources, A.N., N.J., A.G. and S.U.K.; Software, A.N., N.J., A.G., S.U.K. and F.R.A.; Supervision, A.N., N.J., A.G., S.U.K. and F.R.A.; Validation, A.N., N.J., S.U.K. and F.R.A.; Visualization, A.N. and N.J.; Writing—original draft, A.N. and N.J.; Writing—review & editing, A.N., N.J., A.G., S.U.K. and F.R.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

There is no data supported this study.

Acknowledgments

The authors are grateful to the Deanship of Scientific Research, King Saud University for funding through Vice Deanship of Scientific Research Chairs.

Conflicts of Interest

All the authors declare that they do not have conflicts in the publication of this article.

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control. 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  2. Klir, G.J.; Folger, T.A. Fuzzy Sets, Uncertainty, and Information; Prentice Hall: Englewood Cliffs, NJ, USA, 1988. [Google Scholar]
  3. Mendel, J.M. Fuzzy logic systems for engineering: A tutorial. Proc. IEEE 1995, 83, 345–377. [Google Scholar] [CrossRef] [Green Version]
  4. Zadeh, L.A. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–249. [Google Scholar] [CrossRef]
  5. Bustince, H.; Burillo, P. Mathematical analysis of interval-valued fuzzy relations: Application to approximate reasoning. Fuzzy Sets Syst. 2000, 113, 205–219. [Google Scholar] [CrossRef]
  6. Goguen, J.A., Jr. Concept representation in natural and artificial languages: Axioms, extensions and applications for fuzzy sets. Int. J. Man-Mach. Stud. 1974, 6, 513–561. [Google Scholar] [CrossRef]
  7. Żywica, P. Modelling medical uncertainties with use of fuzzy sets and their extensions. In Proceedings of the International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, Cádiz, Spain, 18 May 2018; Springer: Cham, Germany, 2018; pp. 369–380. [Google Scholar] [CrossRef]
  8. Román-Flores, H.; Barros, L.C.; Bassanezi, R.C. A note on Zadeh’s extensions. Fuzzy Sets Syst. 2001, 117, 327–331. [Google Scholar] [CrossRef]
  9. Dubois, D.; Prade, H. Gradualness, uncertainty and bipolarity: Making sense of fuzzy sets. Fuzzy Sets Syst. 2012, 192, 3–24. [Google Scholar] [CrossRef]
  10. Gehrke, M.; Walker, C.; Walker, E. Some comments on interval valued fuzzy sets! Structure 1996, 1, 2. [Google Scholar] [CrossRef]
  11. Bustince, H. Indicator of inclusion grade for interval-valued fuzzy sets. Application to approximate reasoning based on interval-valued fuzzy sets. Int. J. Approx. Reason. 2000, 23, 137–209. [Google Scholar] [CrossRef] [Green Version]
  12. Turksen, I.B. Interval-valued fuzzy sets and ‘compensatory AND’. Fuzzy Sets Syst. 1992, 51, 295–307. [Google Scholar] [CrossRef]
  13. Ramot, D.; Milo, R.; Friedman, M.; Kandel, A. Complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2002, 10, 171–186. [Google Scholar] [CrossRef]
  14. Ramot, D.; Friedman, M.; Langholz, G.; Kandel, A. Complex fuzzy logic. IEEE Trans. Fuzzy Syst. 2003, 11, 450–461. [Google Scholar] [CrossRef]
  15. Greenfield, S.; Chiclana, F.; Dick, S. Interval-valued complex fuzzy logic. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 2014–2019. [Google Scholar]
  16. Nasir, A.; Jan, N.; Gumaei, A.; Khan, S.U. Medical diagnosis and life span of sufferer using interval valued complex fuzzy relations. IEEE Access 2021, 9, 93764–93780. [Google Scholar] [CrossRef]
  17. Chen, Z.; Aghakhani, S.; Man, J.; Dick, S. ANCFIS: A neurofuzzy architecture employing complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 19, 305–322. [Google Scholar] [CrossRef]
  18. Yazdanbakhsh, O.; Dick, S. A systematic review of complex fuzzy sets and logic. Fuzzy Sets Syst. 2018, 338, 1–22. [Google Scholar] [CrossRef]
  19. Tamir, D.E.; Rishe, N.D.; Kandel, A. Complex fuzzy sets and complex fuzzy logic an overview of theory and applications. Fifty Years Fuzzy Log. Its Appl. 2015, 326, 661–681. [Google Scholar]
  20. Dai, S.; Bi, L.; Hu, B. Distance measures between the interval-valued complex fuzzy sets. Mathematics 2019, 7, 549. [Google Scholar] [CrossRef] [Green Version]
  21. Greenfield, S.; Chiclana, F.; Dick, S. Join and meet operations for interval-valued complex fuzzy logic. In Proceedings of the 2016 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS), El Paso, TX, USA, 31 October–4 November 2016; pp. 1–5. [Google Scholar]
  22. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  23. Burillo, P.; Bustince, H. Intuitionistic fuzzy relations (Part I). Mathw. Soft Comput. 2016, 2, 5–38. [Google Scholar]
  24. Atanassov, K.T. Interval valued intuitionistic fuzzy sets. In Intuitionistic Fuzzy Sets; Physica: Heidelberg, Germany, 1999; pp. 139–177. [Google Scholar]
  25. Alkouri, A.S.; Salleh, A.R. Complex intuitionistic fuzzy sets. AIP Conf. Proc. 2012, 1482, 464. [Google Scholar]
  26. Garg, H.; Rani, D. Complex interval-valued intuitionistic fuzzy sets and their aggregation operators. Fundam. Inform. 2019, 164, 61–101. [Google Scholar] [CrossRef]
  27. Li, D.F. Multiattribute decision making models and methods using intuitionistic fuzzy sets. J. Comput. Syst. Sci. 2005, 70, 73–85. [Google Scholar] [CrossRef] [Green Version]
  28. De, S.K.; Biswas, R.; Roy, A.R. An application of intuitionistic fuzzy sets in medical diagnosis. Fuzzy Sets Syst. 2001, 117, 209–213. [Google Scholar] [CrossRef]
  29. Vlachos, I.K.; Sergiadis, G.D. Intuitionistic fuzzy information–applications to pattern recognition. Pattern Recognit. Lett. 2007, 28, 197–206. [Google Scholar] [CrossRef]
  30. Lee, K.M.; LEE, K.M.; CIOS, K.J. Comparison of interval-valued fuzzy sets, intuitionistic fuzzy sets, and bipolar-valued fuzzy sets. In Computing and Information Technologies: Exploring Emerging Technologies; World Scientific: Hackensack, NJ, USA, 2001; pp. 433–439. [Google Scholar] [CrossRef]
  31. Grzegorzewski, P. Distances between intuitionistic fuzzy sets and/or interval-valued fuzzy sets based on the Hausdorff metric. Fuzzy Sets Syst. 2004, 148, 319–328. [Google Scholar] [CrossRef]
  32. Nasir, A.; Jan, N.; Yang, M.-S.; Khan, S.U. Complex T-spherical fuzzy relations with their applications in economic relationships and international trades. IEEE Access 2021, 9, 66115–66131. [Google Scholar] [CrossRef]
  33. Khan, S.U.; Nasir, A.; Jan, N.; Ma, Z.H. Graphical Analysis of Covering and Paired Domination in the Environment of Neutrosophic Information. Math. Probl. Eng. 2021, 2021. [Google Scholar] [CrossRef]
  34. Nasir, A.; Jan, N.; Gumaei, A.; Khan, S.U.; Al-Rakhami, M. Evaluation of the Economic Relationships on the Basis of Statistical Decision-Making in Complex Neutrosophic Environment. Complexity 2021, 2021. [Google Scholar] [CrossRef]
  35. Jan, N.; Rehman, S.U.; Nasir, A.; Aydi, H.; Khan, S.U. Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information. Secu. Comm. Nets. 2021, 2021. [Google Scholar] [CrossRef]
  36. Ali, M.; Tamir, D.E.; Rishe, N.D.; Kandel, A. Complex intuitionistic fuzzy classes. In Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver, BC, Canada, 24–29 July 2016; pp. 2027–2034. [Google Scholar]
  37. Liu, Y.; Jiang, W. A new distance measure of interval-valued intuitionistic fuzzy sets and its application in decision making. Soft Comput. 2019, 24, 1–17. [Google Scholar] [CrossRef]
  38. Bustince, H.; Burillo, P. Correlation of interval-valued intuitionistic fuzzy sets. Fuzzy Sets Syst. 1995, 74, 237–244. [Google Scholar] [CrossRef]
  39. Nayagam, V.L.G.; Sivaraman, G. Ranking of interval-valued intuitionistic fuzzy sets. Appl. Soft Comput. 2011, 11, 3368–3372. [Google Scholar] [CrossRef]
  40. Otero, A.R.; Tejay, G.; Otero, L.D.; Ruiz-Torres, A.J. A fuzzy logic-based information security control assessment for organizations. In Proceedings of the 2012 IEEE Conference on Open Systems, Kuala Lumpur, Malaysia, 21–24 October 2012; pp. 1–6. [Google Scholar]
  41. Tariq, M.I.; Ahmed, S.; Memon, N.A.; Tayyaba, S.; Ashraf, M.W.; Nazir, M.; Hussain, A.; Balas, V.E.; Balas, M.M. Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 2020, 20, 1310. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  42. Tariq, M.I.; Tayyaba, S.; Ali Mian, N.; Sarfraz, M.S.; De-la-Hoz-Franco, E.; Butt, S.A.; Santarcangelo, V.; Rad, D.V. Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment. J. Intell. Fuzzy Sys. 2020, 38, 6075–6088. [Google Scholar] [CrossRef]
  43. Mokhtari, S.M.; Alinejad-Rokny, H.; Jalalifar, H. Selection of the best well control system by using fuzzy multiple-attribute decision-making methods. J. Appl. Stat. 2014, 41, 1105–1121. [Google Scholar] [CrossRef]
Figure 1. Interval-valued complex intuitionistic fuzzy relation.
Figure 1. Interval-valued complex intuitionistic fuzzy relation.
Applsci 11 07668 g001
Figure 2. Hasse diagram for an IVCI-partial order-FR
Figure 2. Hasse diagram for an IVCI-partial order-FR
Applsci 11 07668 g002
Figure 3. Hasse Diagram for set .
Figure 3. Hasse Diagram for set .
Applsci 11 07668 g003
Figure 4. Flowchart for the process being followed.
Figure 4. Flowchart for the process being followed.
Applsci 11 07668 g004
Figure 5. Flowchart of the process for selecting the best cyber-security.
Figure 5. Flowchart of the process for selecting the best cyber-security.
Applsci 11 07668 g005
Figure 6. Data Encryption.
Figure 6. Data Encryption.
Applsci 11 07668 g006
Figure 7. Hasse diagram for IVC-partial order-FR
Figure 7. Hasse diagram for IVC-partial order-FR
Applsci 11 07668 g007
Table 1. Details of security measures.
Table 1. Details of security measures.
Security MeasuresAbbreviationsMembershipNon-Membership
Default-deny as a standard policy D D [ 0.550 , 0.600 ] e i 16 [ 0.500 , 0.750 ] π [ 0.300 , 0.400 ] e i 16 [ 0.125 , 0.313 ] π
Proactive protection P P [ 0.475 , 0.525 ] e i 16 [ 0.375 , 0.438 ] π [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.250 ] π
Device Control technology D C T [ 0.375 , 0.525 ] e i 16 [ 0.438 , 0.563 ] π [ 0.200 , 0.350 ] e i 16 [ 0.188 , 0.250 ] π
All-in-one IT Security Console I T S C [ 0.400 , 0.500 ] e i 16 [ 0.313 , 0.438 ] π [ 0.250 , 0.350 ] e i 16 [ 0.250 , 0.313 ] π
Integration with SIEM S I E M [ 0.300 , 0.375 ] e i 16 [ 0.563 , 0.613 ] π [ 0.275 , 0.325 ] e i 16 [ 0.188 , 0.313 ] π
Table 2. Details of code penetration sources.
Table 2. Details of code penetration sources.
SourceAbbreviationMembershipNon-Membership
Mobile Devices M D [ 0.275 , 0.375 ] e i 16 [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i 16 [ 0.250 , 0.313 ] π
USB Ports U S B [ 0.375 , 0.450 ] e i 16 [ 0.250 , 0.375 ] π [ 0.275 , 0.325 ] e i 16 [ 0.125 , 0.250 ] π
Remote Access R A [ 0.350 , 0.400 ] e i 16 [ 0.375 , 0.438 ] π [ 0.325 , 0.350 ] e i 16 [ 0.188 , 0.313 ] π
Wi-Fi W i F i [ 0.450 , 0.550 ] e i 16 [ 0.313 , 0.500 ] π [ 0.325 , 0.400 ] e i 16 [ 0.188 , 0.250 ] π
HMI Interface H M I [ 0.300 , 0.375 ] e i 16 [ 0.438 , 0.563 ] π [ 0.200 , 0.300 ] e i 16 [ 0.063 , 0.188 ] π
Internet Connections I C [ 0.475 , 0.575 ] e i 16 [ 0.500 , 0.613 ] π [ 0.250 , 0.350 ] e i 16 [ 0.125 , 0.313 ] π
Outside Contractors O C [ 0.500 , 0.550 ] e i 16 [ 0.375 , 0.500 ] π [ 0.225 , 0.300 ] e i 16 [ 0.063 , 0.250 ] π
Corporate Networks C N [ 0.200 , 0.475 ] e i 16 [ 0.313 , 0.613 ] π [ 0.250 , 0.375 ] e i 16 [ 0.125 , 0.188 ] π
Table 3. IVCI-partial order-FR × .
Table 3. IVCI-partial order-FR × .
Ordered   Pairs   ( = × ) Degrees   of   Membership   ( ḿ ) Degrees of Non-Membership ( )
( A C , A C ) [ 0.455 , 0.575 ] e i [ 0.305 , 0.540 ] π [ 0.100 , 0.180 ] e i [ 0.009 , 0.270 ] π
( A C ,   S I E M ) [ 0.455 , 0.575 ] e i [ 0.305 , 0.540 ] π [ 0.100 , 0.180 ] e i [ 0.050 , 0.270 ] π
( A M S , A M S ) [ 0.560 , 0.610 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π
( A M S , E ) [ 0.560 , 0.610 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π
( A M S , S I E M ) [ 0.500 , 0.600 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π
( A D , A D ) [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π
( A D , A M S ) [ 0.295 , 0.385 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π
( A D , E ) [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π
( A D , S I E M ) [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π
( A S , A M S ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.350 , 0.400 ] e i [ 0.300 , 0.450 ] π
( A S , A S ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π
( A S , E ) [ 0.650 , 0.810 ] e i [ 0.660 , 0.790 ] π [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π
( A S ,   S I E M ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π
( D L P , A C ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π
( D L P , D L P ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π
( D L P , E P S ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( D L P . S I E M ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π
( E , E ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.085 , 0.190 ] e i [ 0.040 , 0.130 ] π
( E , S I E M ) [ 0.500 , 0.600 ] e i [ 0.650 , 0.700 ] π [ 0.085 , 0.190 ] e i [ 0.050 , 0.130 ] π
( E S , A C ) [ 0.405 , 0.505 ] e i [ 0.305 , 0.540 ] π [ 0.100 , 0.180 ] e i [ 0.060 , 0.270 ] π
( E S , D L P ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π
( E S , E S ) [ 0.405 , 0.505 ] e i [ 0.650 , 0.780 ] π [ 0.050 , 0.100 ] e i [ 0.060 , 0.100 ] π
( E S , E P S ) [ 0.375 , 0.440 ] e i [ 0.350 , 0.450 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( E S , S I E M ) [ 0.405 , 0.505 ] e i [ 0.650 , 0.700 ] π [ 0.050 , 0.100 ] e i [ 0.060 , 0.120 ] π
( E P S , E P S ) [ 0.375 , 0.440 ] e i [ 0.350 , 0.450 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( E P S , S I E M ) [ 0.375 , 0.440 ] e i [ 0.350 , 0.450 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( F W , A M S ) [ 0.450 , 0.530 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π
( F W , A D ) [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π
( F W , E ) [ 0.450 , 0.530 ] e i [ 0.500 , 0.580 ] π [ 0.220 , 0.290 ] e i [ 0.130 , 0.210 ] π
( F W , F W ) [ 0.450 , 0.530 ] e i [ 0.500 , 0.580 ] π [ 0.220 , 0.290 ] e i [ 0.130 , 0.210 ] π
( F W , S I E M ) [ 0.450 , 0.530 ] e i [ 0.500 , 0.580 ] π [ 0.220 , 0.290 ] e i [ 0.130 , 0.210 ] π
( I P S , A M S ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i [ 0.300 , 0.450 ] π
( I P S , A D ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.480 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( I P S , A S ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( I P S , E ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( I P S , F W ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( I P S , I P S ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( I P S , S I E M ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( N S , A C ) [ 0.455 , 0.575 ] e i [ 0.305 , 0.500 ] π [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π
( N S , A M S ) [ 0.500 , 0.580 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.300 , 0.450 ] π
( N S , A D ) [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π [ 0.270 , 0.350 ] e i [ 0.250 , 0.330 ] π
( N S , A S ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π
( N S , D L P ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.310 , 0.385 ] e i [ 0.200 , 0.300 ] π
( N S , E ) [ 0.500 , 0.580 ] e i [ 0.400 , 0.500 ] π [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π
( N S , E S ) [ 0.405 , 0.505 ] e i [ 0.400 , 0.500 ] π [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π
( N S , E P S ) [ 0.375 , 0.440 ] e i [ 0.350 , 0.450 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( N S , F W ) [ 0.450 , 0.530 ] e i [ 0.400 , 0.500 ] π [ 0.220 , 0.290 ] e i [ 0.200 , 0.300 ] π
( N S , I P S ) [ 0.275 , 0.375 ] e i [ 0.375 , 0.500 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( N S , N S ) [ 0.500 , 0.580 ] e i [ 0.400 , 0.500 ] π [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π
( N S , S I E M ) [ 0.500 , 0.580 ] e i [ 0.400 , 0.500 ] π [ 0.200 , 0.280 ] e i [ 0.200 , 0.300 ] π
( S I E M , S I E M ) [ 0.500 , 0.600 ] e i [ 0.650 , 0.700 ] π [ 0.040 , 0.080 ] e i [ 0.050 , 0.120 ] π
( V P N , A C ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , A M S ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , A D ) [ 0.295 , 0.385 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , A S ) [ 0.250 , 0.340 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , D L P ) [ 0.320 , 0.425 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , E ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , E S ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , E P S ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.450 , 0.560 ] e i [ 0.375 , 0.500 ] π
( V P N , F W ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , I P S ) [ 0.275 , 0.375 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , N S ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , S I E M ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , V P N ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( V P N , W i S ) [ 0.320 , 0.450 ] e i [ 0.200 , 0.300 ] π [ 0.350 , 0.410 ] e i [ 0.375 , 0.500 ] π
( W S , A C ) [ 0.325 , 0.375 ] e i [ 0.305 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , A M S ) [ 0.325 , 0.375 ] e i [ 0.350 , 0.460 ] π [ 0.350 , 0.400 ] e i [ 0.300 , 0.450 ] π
( W S , A D ) [ 0.295 , 0.385 ] e i [ 0.390 , 0.480 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , A S ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , D L P ) [ 0.325 , 0.375 ] e i [ 0.290 , 0.380 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , E ) [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , E S ) [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , E P S ) [ 0.325 , 0.375 ] e i [ 0.350 , 0.450 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( W S , F W ) [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , I P S ) [ 0.275 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.350 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , N S ) [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , S I E M ) [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , W S ) [ 0.325 , 0.375 ] e i [ 0.365 , 0.490 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W S , W i S ) [ 0.325 , 0.375 ] e i [ 0.330 , 0.460 ] π [ 0.335 , 0.400 ] e i [ 0.275 , 0.395 ] π
( W i S , A C ) [ 0.450 , 0.560 ] e i [ 0.305 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
( W i S , A M S ) [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π [ 0.350 , 0.390 ] e i [ 0.200 , 0.450 ] π
( W i S , A D ) [ 0.295 , 0.385 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.250 , 0.330 ] π
( W i S , A S ) [ 0.250 , 0.340 ] e i [ 0.300 , 0.375 ] π [ 0.280 , 0.400 ] e i [ 0.220 , 0.300 ] π
( W i S , D L P ) [ 0.360 , 0.425 ] e i [ 0.290 , 0.380 ] π [ 0.310 , 0.385 ] e i [ 0.230 , 0.315 ] π
( W i S , W i S ) [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
( W i S , E S ) [ 0.405 , 0.505 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
( W i S , E P S ) [ 0.375 , 0.440 ] e i [ 0.330 , 0.460 ] π [ 0.450 , 0.560 ] e i [ 0.350 , 0.450 ] π
( W i S , F W ) [ 0.450 , 0.530 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
( W i S , I P S ) [ 0.275 , 0.375 ] e i [ 0.330 , 0.460 ] π [ 0.350 , 0.400 ] e i [ 0.250 , 0.350 ] π
( W i S , N S ) [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
( W i S , S I E M ) [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
( W i S , W i S ) [ 0.450 , 0.560 ] e i [ 0.330 , 0.460 ] π [ 0.285 , 0.390 ] e i [ 0.230 , 0.315 ] π
Table 4. Abbreviations.
Table 4. Abbreviations.
AbbreviationsFull Names
D D Default-Deny as a standard policy
P P Proactive Protection
S I E M Integration with SIEM
U S B USB Ports
R A Remote Access
I C Internet Connections
O C Outside Contractors
Table 5. Comparison on the basis of structural properties.
Table 5. Comparison on the basis of structural properties.
StructureMembershipNon-MembershipMultidimensional VariablesInterval-Values
FR
CFR
IVFR
IVCFR
IFR
CIFR
IVIFR
IVCIFR
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nasir, A.; Jan, N.; Gumaei, A.; Khan, S.U.; Albogamy, F.R. Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations. Appl. Sci. 2021, 11, 7668. https://doi.org/10.3390/app11167668

AMA Style

Nasir A, Jan N, Gumaei A, Khan SU, Albogamy FR. Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations. Applied Sciences. 2021; 11(16):7668. https://doi.org/10.3390/app11167668

Chicago/Turabian Style

Nasir, Abdul, Naeem Jan, Abdu Gumaei, Sami Ullah Khan, and Fahad R. Albogamy. 2021. "Cybersecurity against the Loopholes in Industrial Control Systems Using Interval-Valued Complex Intuitionistic Fuzzy Relations" Applied Sciences 11, no. 16: 7668. https://doi.org/10.3390/app11167668

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop