Prof Raees Khan - Academia.edu (original) (raw)

Papers by Prof Raees Khan

Research paper thumbnail of Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model

Electronics, Mar 9, 2022

Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-d... more Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as privacy preservation, authenticity, and accessibility. To fight these risks, different organizations nowadays use a variety of approaches, techniques, and technologies to safeguard the systems' credibility. Establishing policies and procedures, raising user awareness, implementing firewall and verification systems, controlling system access, and building computer-issue management groups are all examples of safeguarding methods. There is a lack of sufficient emphasis on the effectiveness of intrusion-detection systems. In enterprises, IDS is used to analyze the potentially dangerous activities taking place within the technological settings. The selection of efficient IDS is a challenging task for organizations. This research evaluates the impact of five popular IDSs for their efficiency and effectiveness in information security. The authors used the fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS)-based integrated multi-criteria decision-making (MCDM) methodology to evaluate the efficacy of the popular IDSs. The findings of this research suggest that most of the IDSs appear to be highly potential tools. Even though Snort is extensively deployed, Suricata has a substantial advantage over Snort. Suricata uses multi-threading functionality in comparison to Snort to boost the processing performance.

Research paper thumbnail of Effective Assessment of Software Reliability by Using Neuro-Fuzzy System

International Journal of Research, Aug 7, 2015

Software reliability is defined as the probability of software to deliver correct service over a ... more Software reliability is defined as the probability of software to deliver correct service over a period of time under a specified environment. This is becoming more and more important in various software organizations to discover the faults that occur commonly during development process. As the demand of the software application programs increases the quality becomes higher and higher and the reliability of these software becomes more essential. Hence Software reliability is mentioned to be as the one of the important factor during development. Many analytical models were being proposed over the years for assessing the reliability of a software system and for modeling the growth trends of software reliability with different capabilities of prediction at different testing phases. A Neuro Fuzzy based software reliability (SR) model is presented to estimate and assess the quality. Multiple datasets containing software failures are applied to the proposed model. These datasets are obtained from several software projects. Then it is observed that the results obtained indicate a significant improvement in performance by using neural fuzzy model over conventional statistical models (Fuzzy Model) based on non homogeneous Poisson process.

Research paper thumbnail of Early Stage Software Reliability Modeling using Requirements and Object-Oriented Design Metrics: Fuzzy Logic Perspective

International journal of computer applications, Mar 15, 2017

In the current scenario as the influence of information technology has been rising day by day, th... more In the current scenario as the influence of information technology has been rising day by day, the industry is facing the pressure of developing software with higher level of reliability. Generally it is an accepted fact that the roots of unreliability lies in ill defined requirements and design documents. With this spirit, researcher has proposed and implemented a reliability prediction model through fuzzy inference system that utilizes early stage product based measures from requirements and object-oriented design stages. The study starts with the review findings those have been used as foundation for proposing a reliability quantification framework. Subsequently this framework has implemented in the form of reliability prediction model that predicts reliability at the requirements as well as design level through its output variable. The model has been validated as well as quantitatively compared with two existing reliability models. The obtained results are quite encouraging and supports that the proposed framework and reliability prediction model are better. Consideration of requirements phase along with the object-oriented design provides this paper an edge over other similar studies those are based on only design phase. Because ignoring requirements deficiencies and only concentrating on design constructs will not help in developing reliable software.

Research paper thumbnail of Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis

IEEE Access, 2020

Continuous data breaches targeting the invaluable medical records have become a nemesis for the h... more Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue of the healthcare organizations. For achieving this goal, a multi-criteria decision methodology can be a milestone. The authors have used a hybrid integrated Fuzzy Analytical Hierarchy Process-Technique for Order of Preference by Similarity to Ideal Solution (Fuzzy AHP-TOPSIS) method for evaluating various information security factors of a web application in order to provide effective and useful results for the developers and researchers. Furthermore, every calculation needs a validation and scientific proof in our case the study assesses the evaluated result on software of hospital from Varanasi, India. The results and ideology of this study will definitely help the practitioners in developing secure and effective information security within a web application. Moreover, the empirical analysis conducted in our research has attempted to etch a systematic path for the developers who can focus on the most prioritized factors for assured and concrete information security within a web application. INDEX TERMS Information security, healthcare web applications, fuzzy AHP, fuzzy TOPSIS.

Research paper thumbnail of A Hybrid Fuzzy Rule-Based Multi-Criteria Framework for Security Assessment of Medical Device Software

International Journal of Intelligent Engineering and Systems, Oct 31, 2020

The third party software components for medical devices are a critical issue because the hackers ... more The third party software components for medical devices are a critical issue because the hackers can send the updates for medical device software which may contain malware that can affect the medical devices. To quote an instance in this regard is the report generated by Zoll, a supplier of medical devices, which states that several patients' data was exposed in 2019 due to an error which occurred at the time of software updating. In this paper we have attempted the assessment the security of medical devices software from different suppliers. We applied the Fuzzy Analytic Network Process (ANP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) methodology for the assessment of third party software component of medical imaging devices. We have listed the criteria and alternatives for the assessment of the software security. The tabulated results that have been presented in the study are evidently showing the satisfaction degree and the ranking of the software security in the obtained order of A6, A1, A2, A5, A4, and A3. Furthermore, the ranking of the software shows that Rank 1 obtained A6 alternatives, which implies that it is absolutely important. Likewise, Rank 2 implies strongly important, 3rd Rank shows fairly important, 4th shows weakly, 5th shows equally and the 6th Rank equates with bad. Use of our framework would be an apt guideline for the manufacturers and users in developing software that is efficacious while being secure for all the stakeholders associated with the use of medical devices. Should the developers adhere to the suggested framework in this study, they can be assured of developing secure medical device software at the initial level of development of the software.

Research paper thumbnail of A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications

Symmetry, Mar 11, 2020

Although security is an integral aspect of any web application's growth, sustainability is also a... more Although security is an integral aspect of any web application's growth, sustainability is also a pivotal factor in maintaining the web application. It is clear that the software industry aims to develop different methods and initiatives for achieving high security while maintaining high sustainability. Unfortunately, web application protection is useless if the sustainability is low. Thus, the present day need calls for innovation in developing web applications that afford sustainable-security to the users. By improving sustainability along with web application protection, underlying security and sustainability attributes play a vital role in determining the symmetrical effect of the sustainability and security attribute to achieve the best outcome. Sustainability evaluation, therefore, uses security and sustainability qualities to achieve the desired sustainability security solutions. In this study, ten consecutive versions of two web applications were used to determine symmetrical sustainability. The authors used the Fuzzy Analytic Hierarchy Process (Fuzzy-AHP) mechanism to determine sustainability goals and long-term impact. Furthermore, the effect of security on sustainability is assessed, and vice versa. The findings in the paper will prove to be valuable for improving sustainability of the web application.

Research paper thumbnail of Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment

International Journal of Intelligent Engineering and Systems, Dec 31, 2020

Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malwar... more Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malware. Malwares are very vigorous and can penetrate the security of information and communication systems. While there are different techniques available for malware analysis, it becomes challenging to select the most effective approach. In this context, the decision-making process may be an efficient means of empirically assessing the impact of different methods for securing the web applications. In this research study, we have used a methodology that includes the integration of Fuzzy AHP and Fuzzy TOPSIS technique for evaluating the impact of different malware analysis techniques in web application perspective. This study uses different versions of a university's web application for evaluating the impact of several existing malware analysis techniques. The findings of the study show that the Reverse Engineering approach is the most efficient technique for analyzing complex malware. The outcome of this study would definitely aid the future researchers and developers in selecting the appropriate techniques for scanning the web application code and enhancing the security.

Research paper thumbnail of Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

Sustainability, Nov 9, 2021

Machine learning (ML) is one of the dominating technologies practiced in both the industrial and ... more Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cited that there has been a rapid increase in both the frequency and the number of cybersecurity breaches in the last decade. Information security has been compromised by intruders at an alarming rate. Anomaly detection, phishing page identification, software vulnerability diagnosis, malware identification, and denial of services attacks are the main cyber-security issues that demand effective solutions. Researchers and experts have been practicing different approaches to address the current cybersecurity issues and challenges. However, in this research endeavor, our objective is to make an idealness assessment of machine learning-based intrusion detection systems (IDS) under the hesitant fuzzy (HF) conditions, using a multi-criteria decision making (MCDM)-based analytical hierarchy process (AHP) and technique for order of preference by similarity to ideal-solutions (TOPSIS). Hesitant fuzzy sets are useful for addressing decision-making situations in which experts must overcome the reluctance to make a conclusion. The proposed research project would assist the machine learning practitioners and cybersecurity specialists in identifying, selecting, and prioritizing cybersecurity-related attributes for intrusion detection systems, and build more ideal and effective intrusion detection systems.

Research paper thumbnail of Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security

Symmetry, Apr 22, 2020

Growing concern about healthcare information security in the wake of alarmingly rising cyber-atta... more Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.

Research paper thumbnail of Fuzzy-Based Unified Decision-Making Technique to Evaluate Security Risks: A Healthcare Perspective

Mathematics, Jun 2, 2023

Neoteric biomedical, technological, and normative shifts have prompted care firms to establish cl... more Neoteric biomedical, technological, and normative shifts have prompted care firms to establish clinical governance as a contrivance to assure high-quality service in an exceedingly intricate milieu. Web security is an epochal concern in the healthcare sector, although it has garnered scant attention since the inception of web applications. The necessity to provide adequate security for healthcare web applications (HWAs) cannot be exaggerated, as umpteen health agencies are contingent on them to carry out their operations. Every healthcare organization renders a humongous volume of data available online to practitioners, pharmacies, and patients. Researchers are continually endeavoring to ameliorate techniques to increase the security and longevity of HWAs. In this context, experts examined certain imperative security risks in HWAs to quantitatively evaluate them in the design phase and covered numerous facets of HWAs, along with their security attributes and risk factors. The authors have proposed a combined approach of fuzzy-based symmetric techniques, i.e., AHP-TOPSIS (Analytic Hierarchy Process-Technique for Order of Preference by Similarity to Ideal Solution), for the assessment of alternative HWAs, leveraging the multi-criteria decision-making (MCDM) approach. Ten consecutive HWAs from local hospitals in Uttar Pradesh, India, have been taken to estimate the security risk, incorporating this methodology to evaluate the priority of weightage and the impact of security attributes. Henceforth, the findings and methodology employed in this study can assist security practitioners in identifying and prioritizing the most influential risk factors to secure HWAs and encourage them to develop revamped or novel methods.

Research paper thumbnail of Hybrid Binary Butterfly Optimization Algorithm and Simulated Annealing for Feature Selection Problem

International Journal of Applied Metaheuristic Computing, Jun 17, 2022

Feature selection is performed to eliminate irrelevant features to reduce computational overheads... more Feature selection is performed to eliminate irrelevant features to reduce computational overheads. Metaheuristic algorithms have become popular for the task of feature selection due to their effectiveness and flexibility. Hybridization of two or more such metaheuristics has become popular in solving optimization problems. In this paper, the authors propose a hybrid wrapper feature selection technique based on binary butterfly optimization algorithm (bBOA) and simulated annealing (SA). The SA is combined with the bBOA in a pipeline fashion such that the best solution obtained by the bBOA is passed on to the SA for further improvement. The SA solution improves the best solution obtained so far by searching in its neighborhood. Thus, the SA tries to enhance the exploitation property of the bBOA. The proposed method is tested on 20 datasets from the UCI repository, and the results are compared with five popular algorithms for feature selection. The results confirm the effectiveness of the hybrid approach in improving the classification accuracy and selecting the optimal feature subset.

Research paper thumbnail of Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework

Computers, Materials & Continua

The current cyber-attack environment has put even the most protected systems at risk as the hacke... more The current cyber-attack environment has put even the most protected systems at risk as the hackers are now modifying technologies to exploit even the tiniest of weaknesses and infiltrate networks. In this situation, it's critical to design and construct software that is both secure and long-lasting. While security is the most well-defined aspect of health information software systems, it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same time. In this league, it is crucial to determine those characteristics in the systems that can help in the accurate assessment of the sustainable-security of the health information software during the development stage. This research work employed the Fuzzy Analytic Network Process (Fuzzy ANP) to estimate the impact of the overall sustainable-security of health information software systems and their characteristics in order to achieve a high level of sustainable-security. Furthermore, the study validates the efficacy of the Fuzzy ANP procedure by testing it on five different versions of a health information software system through Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions (Fuzzy TOPSIS). Despite the sensitivity of the health information software systems, this study employed multiple versions of health information software system. When compared with the existing procedures for testing the sustainable-security of health information software systems, the outcomes were conclusive and significantly more effective. Besides saving time and resources, the mechanism suggested in this research work aims to establish 6012 CMC, 2022, vol.71, no.3 an outline that software practitioners can follow to enhance the sustainablesecurity of health information software systems.

Research paper thumbnail of Integrity Assessment of Medical Devices for Improving Hospital Services

Computers, Materials & Continua

The present study examines the various techniques being used to maintain the integrity of the med... more The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights. The rating of the options determined the order of priority for the procedures. As per the findings of the study, among all the options, A1 was assessed to be the most likely option. This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives. This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices. The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive. Hence instead of conducting a manual valuation, this experimental study is a better and reliable option for assessing the integrity of the medical devices.

Research paper thumbnail of Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

Computer Systems Science and Engineering

In recent years, it has been observed that the disclosure of information increases the risk of te... more In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key attributes of accessibility and security that impact directly and indirectly on each other, such as confidentiality, integrity, availability, and severity. The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process. To calculate the proposed work, researchers utilised the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). The findings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context. The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area.

Research paper thumbnail of An Empirical Investigation to Understand the Issues of Distributed Software Testing amid COVID-19 Pandemic

Processes

Generally, software developers make errors during the distributed software development process; t... more Generally, software developers make errors during the distributed software development process; therefore, software testing delay is a significant concern. Some of the software mistakes are minor, but others may be costly or harmful. Since things can still go wrong—individuals encounter mistakes from time to time—there is a need to double-check any software we develop in a distributed environment. The current global pandemic, COVID-19, has exacerbated and generated new challenges for IT organizations. Many issues exist for distributed software testing that prevent the achievement of successful and timely risk reduction when several of the mechanisms on which testing is based are disrupted. The environment surrounding COVID-19 is quickly evolving on a daily basis. Moreover, the pandemic has exposed or helped to develop flaws in production systems, which obstruct software test completion. Although some of these issues were urgent and needed to be evaluated early during the distributed...

Research paper thumbnail of Cyber Security Analysis and Evaluation for Intrusion Detection Systems

Computers, Materials & Continua, 2022

Machine learning is a technique that is widely employed in both the academic and industrial secto... more Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching information security. Anomaly detection, software vulnerability diagnosis, phishing page identification, denial of service assaults, and malware identification are the foremost cyber-security concerns that require efficient clarifications. Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns. In a similar vein, the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making (MCDM)-based Analytical Hierarchy Process (AHP) and a Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS). Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action. The projected work would support practitioners in identifying, prioritising, and selecting cybersecurityrelated attributes for intrusion detection systems, allowing them to design more optimal and effective intrusion detection systems.

Research paper thumbnail of DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative

ICST Transactions on Scalable Information Systems, 2022

Adversaries always eager to take advantage of flaws in emerging healthcare digital solutions. Ver... more Adversaries always eager to take advantage of flaws in emerging healthcare digital solutions. Very few authors discussed durable application security. Therefore there is a need for a durable security mechanism that must be adequately efficient, is reliable, and defend critical data in an emergency situation. It ensures that the application can be serviced and meet the needs of users over an extended period of time. This paper presents the fuzzy TOPSIS based method to evaluate the behavioural impact for durable security in the context of the Digital India initiative. This paper also presents novel DURASec blueprints for trustworthy and quality healthcare application development.. Even though the advantages of such technologies may outweigh the dangers, hospitals, drugstores, clinics, practitioners, the drug industry as well as medical device manufacturers, should be prepared to identify and minimize security threats in order to protect sensitive healthcare data.

Research paper thumbnail of An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records

Computer Modeling in Engineering & Sciences, 2022

The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare se... more The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare. Despite the phenomenal advancement in the present healthcare services, the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients' data. A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders. Various approaches and methods have been practiced by researchers to secure healthcare digital services. However, there are very few from the Machine learning (ML) domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records (EHRs). The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches. B.A. Kitchenham guidelines have been practiced as a manual to conduct this work. Seven well-known digital libraries namely IEEE Xplore, Science Direct, Springer Link, ACM Digital Library, Willey Online Library, PubMed (Medical and Bio-Science), and MDPI have been included to perform an exhaustive search for the existing pertinent studies. Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion, yet the specified area has not been fully explored by the researchers. K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems' log data. Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies. This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively. Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion.

Research paper thumbnail of The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective

Applied Sciences, 2021

The primary goal of this research study, in the field of information technology (IT), is to impro... more The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software’s durability and security is a dynamic aspect in assessing, administrating, and controlling security for strengthening the features of security. This paper essentially emphasises the demarcation and depiction of quantum computing from a software security perspective. At present, different symmetrical-based cryptography approaches or algorithms are being used to protect different government and non-government sectors, such as banks, healthcare sectors, defense, transport, automobiles, navigators, weather forecasting, etc., to ensure software durability and security. However, many crypto schemes are likely to collapse when a large qubit-based quantum computer is developed...

Research paper thumbnail of Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

Computers, Materials & Continua, 2022

The apparent contradiction between usability and security has been discussed in the literature fo... more The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.

Research paper thumbnail of Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model

Electronics, Mar 9, 2022

Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-d... more Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as privacy preservation, authenticity, and accessibility. To fight these risks, different organizations nowadays use a variety of approaches, techniques, and technologies to safeguard the systems' credibility. Establishing policies and procedures, raising user awareness, implementing firewall and verification systems, controlling system access, and building computer-issue management groups are all examples of safeguarding methods. There is a lack of sufficient emphasis on the effectiveness of intrusion-detection systems. In enterprises, IDS is used to analyze the potentially dangerous activities taking place within the technological settings. The selection of efficient IDS is a challenging task for organizations. This research evaluates the impact of five popular IDSs for their efficiency and effectiveness in information security. The authors used the fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS)-based integrated multi-criteria decision-making (MCDM) methodology to evaluate the efficacy of the popular IDSs. The findings of this research suggest that most of the IDSs appear to be highly potential tools. Even though Snort is extensively deployed, Suricata has a substantial advantage over Snort. Suricata uses multi-threading functionality in comparison to Snort to boost the processing performance.

Research paper thumbnail of Effective Assessment of Software Reliability by Using Neuro-Fuzzy System

International Journal of Research, Aug 7, 2015

Software reliability is defined as the probability of software to deliver correct service over a ... more Software reliability is defined as the probability of software to deliver correct service over a period of time under a specified environment. This is becoming more and more important in various software organizations to discover the faults that occur commonly during development process. As the demand of the software application programs increases the quality becomes higher and higher and the reliability of these software becomes more essential. Hence Software reliability is mentioned to be as the one of the important factor during development. Many analytical models were being proposed over the years for assessing the reliability of a software system and for modeling the growth trends of software reliability with different capabilities of prediction at different testing phases. A Neuro Fuzzy based software reliability (SR) model is presented to estimate and assess the quality. Multiple datasets containing software failures are applied to the proposed model. These datasets are obtained from several software projects. Then it is observed that the results obtained indicate a significant improvement in performance by using neural fuzzy model over conventional statistical models (Fuzzy Model) based on non homogeneous Poisson process.

Research paper thumbnail of Early Stage Software Reliability Modeling using Requirements and Object-Oriented Design Metrics: Fuzzy Logic Perspective

International journal of computer applications, Mar 15, 2017

In the current scenario as the influence of information technology has been rising day by day, th... more In the current scenario as the influence of information technology has been rising day by day, the industry is facing the pressure of developing software with higher level of reliability. Generally it is an accepted fact that the roots of unreliability lies in ill defined requirements and design documents. With this spirit, researcher has proposed and implemented a reliability prediction model through fuzzy inference system that utilizes early stage product based measures from requirements and object-oriented design stages. The study starts with the review findings those have been used as foundation for proposing a reliability quantification framework. Subsequently this framework has implemented in the form of reliability prediction model that predicts reliability at the requirements as well as design level through its output variable. The model has been validated as well as quantitatively compared with two existing reliability models. The obtained results are quite encouraging and supports that the proposed framework and reliability prediction model are better. Consideration of requirements phase along with the object-oriented design provides this paper an edge over other similar studies those are based on only design phase. Because ignoring requirements deficiencies and only concentrating on design constructs will not help in developing reliable software.

Research paper thumbnail of Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis

IEEE Access, 2020

Continuous data breaches targeting the invaluable medical records have become a nemesis for the h... more Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue of the healthcare organizations. For achieving this goal, a multi-criteria decision methodology can be a milestone. The authors have used a hybrid integrated Fuzzy Analytical Hierarchy Process-Technique for Order of Preference by Similarity to Ideal Solution (Fuzzy AHP-TOPSIS) method for evaluating various information security factors of a web application in order to provide effective and useful results for the developers and researchers. Furthermore, every calculation needs a validation and scientific proof in our case the study assesses the evaluated result on software of hospital from Varanasi, India. The results and ideology of this study will definitely help the practitioners in developing secure and effective information security within a web application. Moreover, the empirical analysis conducted in our research has attempted to etch a systematic path for the developers who can focus on the most prioritized factors for assured and concrete information security within a web application. INDEX TERMS Information security, healthcare web applications, fuzzy AHP, fuzzy TOPSIS.

Research paper thumbnail of A Hybrid Fuzzy Rule-Based Multi-Criteria Framework for Security Assessment of Medical Device Software

International Journal of Intelligent Engineering and Systems, Oct 31, 2020

The third party software components for medical devices are a critical issue because the hackers ... more The third party software components for medical devices are a critical issue because the hackers can send the updates for medical device software which may contain malware that can affect the medical devices. To quote an instance in this regard is the report generated by Zoll, a supplier of medical devices, which states that several patients' data was exposed in 2019 due to an error which occurred at the time of software updating. In this paper we have attempted the assessment the security of medical devices software from different suppliers. We applied the Fuzzy Analytic Network Process (ANP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) methodology for the assessment of third party software component of medical imaging devices. We have listed the criteria and alternatives for the assessment of the software security. The tabulated results that have been presented in the study are evidently showing the satisfaction degree and the ranking of the software security in the obtained order of A6, A1, A2, A5, A4, and A3. Furthermore, the ranking of the software shows that Rank 1 obtained A6 alternatives, which implies that it is absolutely important. Likewise, Rank 2 implies strongly important, 3rd Rank shows fairly important, 4th shows weakly, 5th shows equally and the 6th Rank equates with bad. Use of our framework would be an apt guideline for the manufacturers and users in developing software that is efficacious while being secure for all the stakeholders associated with the use of medical devices. Should the developers adhere to the suggested framework in this study, they can be assured of developing secure medical device software at the initial level of development of the software.

Research paper thumbnail of A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications

Symmetry, Mar 11, 2020

Although security is an integral aspect of any web application's growth, sustainability is also a... more Although security is an integral aspect of any web application's growth, sustainability is also a pivotal factor in maintaining the web application. It is clear that the software industry aims to develop different methods and initiatives for achieving high security while maintaining high sustainability. Unfortunately, web application protection is useless if the sustainability is low. Thus, the present day need calls for innovation in developing web applications that afford sustainable-security to the users. By improving sustainability along with web application protection, underlying security and sustainability attributes play a vital role in determining the symmetrical effect of the sustainability and security attribute to achieve the best outcome. Sustainability evaluation, therefore, uses security and sustainability qualities to achieve the desired sustainability security solutions. In this study, ten consecutive versions of two web applications were used to determine symmetrical sustainability. The authors used the Fuzzy Analytic Hierarchy Process (Fuzzy-AHP) mechanism to determine sustainability goals and long-term impact. Furthermore, the effect of security on sustainability is assessed, and vice versa. The findings in the paper will prove to be valuable for improving sustainability of the web application.

Research paper thumbnail of Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment

International Journal of Intelligent Engineering and Systems, Dec 31, 2020

Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malwar... more Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malware. Malwares are very vigorous and can penetrate the security of information and communication systems. While there are different techniques available for malware analysis, it becomes challenging to select the most effective approach. In this context, the decision-making process may be an efficient means of empirically assessing the impact of different methods for securing the web applications. In this research study, we have used a methodology that includes the integration of Fuzzy AHP and Fuzzy TOPSIS technique for evaluating the impact of different malware analysis techniques in web application perspective. This study uses different versions of a university's web application for evaluating the impact of several existing malware analysis techniques. The findings of the study show that the Reverse Engineering approach is the most efficient technique for analyzing complex malware. The outcome of this study would definitely aid the future researchers and developers in selecting the appropriate techniques for scanning the web application code and enhancing the security.

Research paper thumbnail of Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

Sustainability, Nov 9, 2021

Machine learning (ML) is one of the dominating technologies practiced in both the industrial and ... more Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cited that there has been a rapid increase in both the frequency and the number of cybersecurity breaches in the last decade. Information security has been compromised by intruders at an alarming rate. Anomaly detection, phishing page identification, software vulnerability diagnosis, malware identification, and denial of services attacks are the main cyber-security issues that demand effective solutions. Researchers and experts have been practicing different approaches to address the current cybersecurity issues and challenges. However, in this research endeavor, our objective is to make an idealness assessment of machine learning-based intrusion detection systems (IDS) under the hesitant fuzzy (HF) conditions, using a multi-criteria decision making (MCDM)-based analytical hierarchy process (AHP) and technique for order of preference by similarity to ideal-solutions (TOPSIS). Hesitant fuzzy sets are useful for addressing decision-making situations in which experts must overcome the reluctance to make a conclusion. The proposed research project would assist the machine learning practitioners and cybersecurity specialists in identifying, selecting, and prioritizing cybersecurity-related attributes for intrusion detection systems, and build more ideal and effective intrusion detection systems.

Research paper thumbnail of Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security

Symmetry, Apr 22, 2020

Growing concern about healthcare information security in the wake of alarmingly rising cyber-atta... more Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.

Research paper thumbnail of Fuzzy-Based Unified Decision-Making Technique to Evaluate Security Risks: A Healthcare Perspective

Mathematics, Jun 2, 2023

Neoteric biomedical, technological, and normative shifts have prompted care firms to establish cl... more Neoteric biomedical, technological, and normative shifts have prompted care firms to establish clinical governance as a contrivance to assure high-quality service in an exceedingly intricate milieu. Web security is an epochal concern in the healthcare sector, although it has garnered scant attention since the inception of web applications. The necessity to provide adequate security for healthcare web applications (HWAs) cannot be exaggerated, as umpteen health agencies are contingent on them to carry out their operations. Every healthcare organization renders a humongous volume of data available online to practitioners, pharmacies, and patients. Researchers are continually endeavoring to ameliorate techniques to increase the security and longevity of HWAs. In this context, experts examined certain imperative security risks in HWAs to quantitatively evaluate them in the design phase and covered numerous facets of HWAs, along with their security attributes and risk factors. The authors have proposed a combined approach of fuzzy-based symmetric techniques, i.e., AHP-TOPSIS (Analytic Hierarchy Process-Technique for Order of Preference by Similarity to Ideal Solution), for the assessment of alternative HWAs, leveraging the multi-criteria decision-making (MCDM) approach. Ten consecutive HWAs from local hospitals in Uttar Pradesh, India, have been taken to estimate the security risk, incorporating this methodology to evaluate the priority of weightage and the impact of security attributes. Henceforth, the findings and methodology employed in this study can assist security practitioners in identifying and prioritizing the most influential risk factors to secure HWAs and encourage them to develop revamped or novel methods.

Research paper thumbnail of Hybrid Binary Butterfly Optimization Algorithm and Simulated Annealing for Feature Selection Problem

International Journal of Applied Metaheuristic Computing, Jun 17, 2022

Feature selection is performed to eliminate irrelevant features to reduce computational overheads... more Feature selection is performed to eliminate irrelevant features to reduce computational overheads. Metaheuristic algorithms have become popular for the task of feature selection due to their effectiveness and flexibility. Hybridization of two or more such metaheuristics has become popular in solving optimization problems. In this paper, the authors propose a hybrid wrapper feature selection technique based on binary butterfly optimization algorithm (bBOA) and simulated annealing (SA). The SA is combined with the bBOA in a pipeline fashion such that the best solution obtained by the bBOA is passed on to the SA for further improvement. The SA solution improves the best solution obtained so far by searching in its neighborhood. Thus, the SA tries to enhance the exploitation property of the bBOA. The proposed method is tested on 20 datasets from the UCI repository, and the results are compared with five popular algorithms for feature selection. The results confirm the effectiveness of the hybrid approach in improving the classification accuracy and selecting the optimal feature subset.

Research paper thumbnail of Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework

Computers, Materials & Continua

The current cyber-attack environment has put even the most protected systems at risk as the hacke... more The current cyber-attack environment has put even the most protected systems at risk as the hackers are now modifying technologies to exploit even the tiniest of weaknesses and infiltrate networks. In this situation, it's critical to design and construct software that is both secure and long-lasting. While security is the most well-defined aspect of health information software systems, it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same time. In this league, it is crucial to determine those characteristics in the systems that can help in the accurate assessment of the sustainable-security of the health information software during the development stage. This research work employed the Fuzzy Analytic Network Process (Fuzzy ANP) to estimate the impact of the overall sustainable-security of health information software systems and their characteristics in order to achieve a high level of sustainable-security. Furthermore, the study validates the efficacy of the Fuzzy ANP procedure by testing it on five different versions of a health information software system through Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions (Fuzzy TOPSIS). Despite the sensitivity of the health information software systems, this study employed multiple versions of health information software system. When compared with the existing procedures for testing the sustainable-security of health information software systems, the outcomes were conclusive and significantly more effective. Besides saving time and resources, the mechanism suggested in this research work aims to establish 6012 CMC, 2022, vol.71, no.3 an outline that software practitioners can follow to enhance the sustainablesecurity of health information software systems.

Research paper thumbnail of Integrity Assessment of Medical Devices for Improving Hospital Services

Computers, Materials & Continua

The present study examines the various techniques being used to maintain the integrity of the med... more The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights. The rating of the options determined the order of priority for the procedures. As per the findings of the study, among all the options, A1 was assessed to be the most likely option. This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives. This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices. The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive. Hence instead of conducting a manual valuation, this experimental study is a better and reliable option for assessing the integrity of the medical devices.

Research paper thumbnail of Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

Computer Systems Science and Engineering

In recent years, it has been observed that the disclosure of information increases the risk of te... more In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key attributes of accessibility and security that impact directly and indirectly on each other, such as confidentiality, integrity, availability, and severity. The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process. To calculate the proposed work, researchers utilised the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). The findings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context. The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area.

Research paper thumbnail of An Empirical Investigation to Understand the Issues of Distributed Software Testing amid COVID-19 Pandemic

Processes

Generally, software developers make errors during the distributed software development process; t... more Generally, software developers make errors during the distributed software development process; therefore, software testing delay is a significant concern. Some of the software mistakes are minor, but others may be costly or harmful. Since things can still go wrong—individuals encounter mistakes from time to time—there is a need to double-check any software we develop in a distributed environment. The current global pandemic, COVID-19, has exacerbated and generated new challenges for IT organizations. Many issues exist for distributed software testing that prevent the achievement of successful and timely risk reduction when several of the mechanisms on which testing is based are disrupted. The environment surrounding COVID-19 is quickly evolving on a daily basis. Moreover, the pandemic has exposed or helped to develop flaws in production systems, which obstruct software test completion. Although some of these issues were urgent and needed to be evaluated early during the distributed...

Research paper thumbnail of Cyber Security Analysis and Evaluation for Intrusion Detection Systems

Computers, Materials & Continua, 2022

Machine learning is a technique that is widely employed in both the academic and industrial secto... more Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching information security. Anomaly detection, software vulnerability diagnosis, phishing page identification, denial of service assaults, and malware identification are the foremost cyber-security concerns that require efficient clarifications. Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns. In a similar vein, the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making (MCDM)-based Analytical Hierarchy Process (AHP) and a Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS). Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action. The projected work would support practitioners in identifying, prioritising, and selecting cybersecurityrelated attributes for intrusion detection systems, allowing them to design more optimal and effective intrusion detection systems.

Research paper thumbnail of DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative

ICST Transactions on Scalable Information Systems, 2022

Adversaries always eager to take advantage of flaws in emerging healthcare digital solutions. Ver... more Adversaries always eager to take advantage of flaws in emerging healthcare digital solutions. Very few authors discussed durable application security. Therefore there is a need for a durable security mechanism that must be adequately efficient, is reliable, and defend critical data in an emergency situation. It ensures that the application can be serviced and meet the needs of users over an extended period of time. This paper presents the fuzzy TOPSIS based method to evaluate the behavioural impact for durable security in the context of the Digital India initiative. This paper also presents novel DURASec blueprints for trustworthy and quality healthcare application development.. Even though the advantages of such technologies may outweigh the dangers, hospitals, drugstores, clinics, practitioners, the drug industry as well as medical device manufacturers, should be prepared to identify and minimize security threats in order to protect sensitive healthcare data.

Research paper thumbnail of An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records

Computer Modeling in Engineering & Sciences, 2022

The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare se... more The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare. Despite the phenomenal advancement in the present healthcare services, the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients' data. A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders. Various approaches and methods have been practiced by researchers to secure healthcare digital services. However, there are very few from the Machine learning (ML) domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records (EHRs). The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches. B.A. Kitchenham guidelines have been practiced as a manual to conduct this work. Seven well-known digital libraries namely IEEE Xplore, Science Direct, Springer Link, ACM Digital Library, Willey Online Library, PubMed (Medical and Bio-Science), and MDPI have been included to perform an exhaustive search for the existing pertinent studies. Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion, yet the specified area has not been fully explored by the researchers. K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems' log data. Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies. This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively. Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion.

Research paper thumbnail of The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective

Applied Sciences, 2021

The primary goal of this research study, in the field of information technology (IT), is to impro... more The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software’s durability and security is a dynamic aspect in assessing, administrating, and controlling security for strengthening the features of security. This paper essentially emphasises the demarcation and depiction of quantum computing from a software security perspective. At present, different symmetrical-based cryptography approaches or algorithms are being used to protect different government and non-government sectors, such as banks, healthcare sectors, defense, transport, automobiles, navigators, weather forecasting, etc., to ensure software durability and security. However, many crypto schemes are likely to collapse when a large qubit-based quantum computer is developed...

Research paper thumbnail of Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

Computers, Materials & Continua, 2022

The apparent contradiction between usability and security has been discussed in the literature fo... more The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.