{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:44:03Z","timestamp":1776811443037,"version":"3.51.2"},"reference-count":16,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2021,5,6]]},"abstract":"<jats:p>In connection with problems such as difficulty in the objective and accurate calculation of the index weight in the security risk assessment of an airborne network, as well as a unitary assessment result and poor descriptiveness, a risk assessment method for airborne network security based on an improved fuzzy analytic hierarchy process (FAHP)-cloud model has been proposed. First, the particularity of the airborne network is taken into account to establish an index system for the risk assessment of airborne network security. the traditional FAHP, information entropy is introduced to calculate the comprehensive weight, which is subsequently combined with the cloud model theory to construct an actual integrated cloud model. By calculating the degree of similarity between the actual integrated cloud model and the standard cloud model, the risk levels of airborne network security are determined. The simulation experiments show that this method can reflect the objectivity of the index weight, make the assessment results more visual and reliable, and fully reflect the fuzziness and randomness in the assessment.<\/jats:p>","DOI":"10.3233\/jcm-204532","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T11:21:23Z","timestamp":1594725683000},"page":"277-291","source":"Crossref","is-referenced-by-count":2,"title":["An improved FAHP-cloud-based security risk assessment model for airborne networks"],"prefix":"10.66113","volume":"21","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China"}]},{"given":"Jingwen","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing 58 Information Technology Co., Ltd, Beijing, China"}]},{"given":"Guo","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China"}]},{"given":"Tianjing","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China"}]}],"member":"55691","reference":[{"key":"10.3233\/JCM-204532_ref1","doi-asserted-by":"crossref","unstructured":"M.J. Carrico, Mobile device integration in the cockpit: benefits, challenges, and recommendations, Digital Avionics Systems Conference. IEEE, 2015, pp. 1\u201310.","DOI":"10.1109\/DASC.2015.7311562"},{"issue":"7","key":"10.3233\/JCM-204532_ref2","doi-asserted-by":"crossref","first-page":"447","DOI":"10.2514\/1.I010156","article-title":"Information technology security threats to modern e-enabled aircraft: a cautionary note","volume":"11","author":"Wolf","year":"2014","journal-title":"Journal of Aerospace Information Systems"},{"issue":"10","key":"10.3233\/JCM-204532_ref3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCOM.2014.6917398","article-title":"Airborne network evaluation: challenges and high fidelity emulation solution","volume":"52","author":"Kwak","year":"2014","journal-title":"Communications Magazine IEEE"},{"issue":"16","key":"10.3233\/JCM-204532_ref6","first-page":"232","article-title":"Security risk assessment methodology for airborne system","volume":"49","author":"Zhang","year":"2013","journal-title":"Computer Engineering and Applications"},{"key":"10.3233\/JCM-204532_ref7","doi-asserted-by":"crossref","unstructured":"R. Wang, Analytic Hierarchy Process Based Risk Assessment Method for Internet of Things, 2nd International Conference on Energy, Power and Electrical Engineering, EPEE, 2017.","DOI":"10.12783\/dteees\/epee2017\/18155"},{"issue":"4","key":"10.3233\/JCM-204532_ref8","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/TFUZZ.2013.2272585","article-title":"Intuitionistic fuzzy analytic hierarchy process","volume":"22","author":"Xu","year":"2014","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"6","key":"10.3233\/JCM-204532_ref9","first-page":"15","article-title":"Membership clouds and membership cloud generators","author":"Li","year":"1995","journal-title":"Journal of Computer Research and Development"},{"issue":"2","key":"10.3233\/JCM-204532_ref10","doi-asserted-by":"crossref","first-page":"422","DOI":"10.3724\/SP.J.1016.2013.00422","article-title":"Study on the trust evaluation approach based on cloud model","volume":"36","author":"Zhang","year":"2013","journal-title":"Chinese Journal of Computers"},{"issue":"1","key":"10.3233\/JCM-204532_ref11","doi-asserted-by":"crossref","first-page":"69","DOI":"10.14743\/apem2018.1.274","article-title":"Risk management in automotive manufacturing processes based on FMEA and a gray relational analysis: A case study","volume":"13","author":"Baynal","year":"2018","journal-title":"Advances in Production Engineering & Management"},{"issue":"3","key":"10.3233\/JCM-204532_ref12","doi-asserted-by":"crossref","first-page":"338\u00e2\u0080\u0093-353","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"},{"issue":"8","key":"10.3233\/JCM-204532_ref13","doi-asserted-by":"crossref","first-page":"1749","DOI":"10.1109\/TCYB.2016.2537649","article-title":"Risk assessment for mobile systems through a multilayered hierarchical bayesian network","volume":"46","author":"Li","year":"2016","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.3233\/JCM-204532_ref14","unstructured":"X. Liu, Research on an information security risk assessment model based on dynamic threat and fault tree, Dissertation, Lanzhou University, 2014."},{"issue":"2","key":"10.3233\/JCM-204532_ref15","doi-asserted-by":"crossref","first-page":"129","DOI":"10.3233\/JCM-150527","article-title":"An integrated methodology for performance assessment of campus network","volume":"15","author":"Mao","year":"2015","journal-title":"Journal of Computational Methods in Sciences and Engineering"},{"key":"10.3233\/JCM-204532_ref16","doi-asserted-by":"crossref","first-page":"103971","DOI":"10.1016\/j.jappgeo.2020.103971","article-title":"Mesothermal gold prospectivity mapping of the southern Kibi-Winneba belt of Ghana based on Fuzzy analytical hierarchy process, concentration-area (C-A) fractal model and prediction-area (P-A) plot","volume":"174","author":"Forson","year":"2020","journal-title":"Journal of Applied Geophysics"},{"issue":"1","key":"10.3233\/JCM-204532_ref17","doi-asserted-by":"crossref","first-page":"135","DOI":"10.3233\/JCM-160608","article-title":"Research on cloud computing load balancing based on information entropy","volume":"16","author":"Liu","year":"2016","journal-title":"Journal of Computational Methods in Sciences and Engineering"},{"issue":"4","key":"10.3233\/JCM-204532_ref18","doi-asserted-by":"crossref","first-page":"977","DOI":"10.3233\/JCM-180839","article-title":"Driving fatigue detection based on feature fusion of information entropy","volume":"18","author":"Wang","year":"2018","journal-title":"Journal of Computational Methods in Sciences and Engineering"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/content.iospress.com\/download?id=10.3233\/JCM-204532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:06:16Z","timestamp":1776809176000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-204532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":16,"journal-issue":{"issue":"2"},"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.3233\/jcm-204532","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,6]]}}}