[1] Xie, Q., Zhu, Y., Shang, H., & Li, Y. (2021). Variations on the theme of slacks-based measure of efficiency: convex hull-based algorithms. Computers & industrial engineering, 159. https://www.sciencedirect.com/science/article/pii/S0360835221003788
[2] Simmonds, A., Sandilands, P., & Van Ekert, L. (2004). An ontology for network security attacks. Applied computing (pp. 317–323). Berlin, Heidelberg: Springer Berlin Heidelberg.
[3] Pawar, M. V, & Anuradha, J. (2015). Network security and types of attacks in network. Procedia computer science, 48, 503–506. https://www.sciencedirect.com/science/article/pii/S1877050915006353
[4] Greitzer, F. L., & Hohimer, R. E. (2011). Modeling human behavior to anticipate insider attacks. Journal of strategic security, 4(2), 25–48. http://www.jstor.org/stable/26463925
[5] Charnes, A., Cooper, W. W., & Rhodes, E. (1978). Measuring the efficiency of decision making units. European journal of operational research, 2(6), 429–444.
[6] Farrell, M. J. (2018). The measurement of productive efficiency. Royal statistical society. Journal series a: general, 120(3), 253–281. https://doi.org/10.2307/2343100
[7] Banker, R. D., Charnes, A., & Cooper, W. W. (1984). Some models for estimating technical and scale inefficiencies in data envelopment analysis. Management science, 30(9), 1078–1092.
[8] Adler, N., & Golany, B. (2001). Evaluation of deregulated airline networks using data envelopment analysis combined with principal component analysis with an application to Western Europe. European journal of operational research, 132(2), 260–273.
[9] Tone, K. (2001). A slacks-based measure of efficiency in data envelopment analysis. European journal of operational research, 130(3), 498–509.
[10] Shermeh, H. E., Najafi, S. E., & Alavidoost, M. H. (2016). A novel fuzzy network SBM model for data envelopment analysis: a case study in Iran regional power companies. Energy, 112, 686–697.
[11] Rasoulzadeh, M., Edalatpanah, S. A., Fallah, M., & Najafi, S. E. (2022). A multi-objective approach based on Markowitz and DEA cross-efficiency models for the intuitionistic fuzzy portfolio selection problem. Decision making: applications in management and engineering, 5(2), 241–259.
[12] Nojehdehi, R. R., Abianeh, P. M. M., & Valami, H. B. (2012). A geometrical approach for fuzzy production possibility set in data envelopment analysis (DEA) with fuzzy input-output levels. African journal of business management, 6(7), 2738. https://www.researchgate.net/profile/Hadi-Bagherzadeh-Valami/publication/266228810_A_geometrical_approach_for_fuzzy_production_
[13] Ghasemi, N., Najafi, E., Hoseinzadeh Lotfi, F., & Movahedi Sobhani, F. (2020). Assessing the performance of organizations with the hierarchical structure using data envelopment analysis: an efficiency analysis of Farhangian University. Measurement, 156, 107609. https://www.sciencedirect.com/science/article/pii/S0263224120301469
[14] Najafi, E., Aryanezhad, M., & others. (2011). A BSC-DEA approach to measure the relative efficiency of service industry: a case study of banking sector. International journal of industrial engineering computations, 2(2), 273–282. http://growingscience.com/ijiec/Vol2/IJIEC_2010_20.pdf
[15] Lotfi, F. H., Sadjadi, S. J., Khaki, A., & Najafi, E. (2010). A combined interval net DEA and BSC for evaluating organizational efficiency. Applied mathematical sciences, 4(36–39), 1975–1999.
[16] Kianfar, K., Ahadzadeh Namin, M., Alam Tabriz, A., Najafi, E., & Hosseinzadeh Lotfi, F. (2023). Presentation of a novel integrated DEA-BSC model with network structure in multi objective problems. International journal of data envelopment analysis, 3(11). http://ijdea.srbiau.ac.ir/article_13513.html
[17] Jaberi Hafshjani, M., Najafi, S. E., Hosseinzadeh Lotfi, F., & Hajimolana, S. M. (2021). A hybrid BSC-DEA model with indeterminate information. Journal of mathematics, 2021, 8867135. https://doi.org/10.1155/2021/8867135
[18] Rasinojehdehi, R., & Valami, H. B. (2023). A comprehensive neutrosophic model for evaluating the efficiency of airlines based on SBM model of network DEA. Decision making: applications in management and engineering, 6(2), 880–906.
[19] Bagherzadeh Valami, H., & Raeinojehdehi, R. (2016). Ranking units in data envelopment analysis with fuzzy data. Journal of intelligent & fuzzy systems, 30, 2505–2516. DOI:10.3233/IFS-151756
[20] Shirin Karami, R. G. Y., & Mousazadegan, F. (2021). Supplier selection and evaluation in the garment supply chain: an integrated DEA–PCA–VIKOR approach. The journal of the textile institute, 112(4), 578–595. https://doi.org/10.1080/00405000.2020.1768771
[21] Łozowicka, A., & Lach, B. (2022). CI-DEA: a way to improve the discriminatory power of DEA— using the example of the efficiency assessment of the digitalization in the life of the generation 50+. Sustainability, 14(6). https://www.mdpi.com/2071-1050/14/6/3610
[22] Peixoto, M. G. M., Musetti, M. A., & de Mendonça, M. C. A. (2020). Performance management in hospital organizations from the perspective of principal component analysis and data envelopment analysis: the case of federal university hospitals in Brazil. Computers & industrial engineering, 150. https://www.sciencedirect.com/science/article/pii/S0360835220305672
[23] Horng, S. J., Su, M. Y., Chen, Y. H., Kao, T. W., Chen, R. J., Lai, J. L., & Perkasa, C. D. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with applications, 38(1), 306–313. https://www.sciencedirect.com/science/article/pii/S0957417410005701
[24] Ahmad, B., Jian, W., Ali, Z. A., Tanvir, S., & Khan, M. S. (2019). Hybrid anomaly detection by using clustering for wireless sensor network. Wireless personal communications: an international journal, 106(4), 1841–1853. https://doi.org/10.1007/s11277-018-5721-6
[25] Tran, D., Ma, W., & Sharma, D. (2008). Network anomaly detection using fuzzy gaussian mixture models. International journal of future generation communication and networking, 1(1), 37–42.
[26] Golmah, V. (2014). An efficient hybrid intrusion detection system based on C5. 0 and SVM. International journal of database theory and application, 7(2), 59–70. https://www.earticle.net/Article/A230140
[27] Mulak, P., & Talhar, N. (2014). Novel intrusion detection system using hybrid aprroach. International journal of advanced research in computer science and software engineering, 4(11). https://www.semanticscholar.org/paper/Novel-Intrusion-Detection-System-Using-Hybrid-Mulak-Talhar/2ea4d19684c15541c803762a0a4853f285c2868b
[28] Takkellapati, V. S., & Prasad, G. (2012). Network intrusion detection system based on feature selection and triangle area support vector machine. International journal of engineering trends and technology, 3(4), 466–470. https://ijettjournal.org/assets/volume-3/issue-4/IJETT-V3I4P201.pdf
[29] Ioannis, K., Dimitriou, T., & Freiling, F. C. (2007). Towards intrusion detection in wireless sensor networks. Proc. of the 13th European wireless conference (pp. 1–10). http://tassosdimitriou.com/various/IntrusionEW07.pdf
[30] Amini, M., & Jalili, R. (2004). Network-based intrusion detection using unsupervised adaptive resonance theory (art). Proceedings of the 4th conference on engineering of intelligent systems (eis 2004) (pp. 1–7). http://sina.sharif.edu/~amini/publications/conferences/2004/
[31] Yang, X., & Zhu, A. (2021). Research on computer network security emergency response systematization. Journal of physics: conference series, 1771(1), 1–6. https://dx.doi.org/10.1088/1742-6596/1771/1/012012