<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tihomir Videv</style></author><author><style face="normal" font="default" size="100%">Boris Bozveliev</style></author><author><style face="normal" font="default" size="100%">Sotir Sotirov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber systems</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized nets</style></keyword><keyword><style  face="normal" font="default" size="100%">Intuitionistic fuzzy estimation</style></keyword><keyword><style  face="normal" font="default" size="100%">smart house</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">45-53</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The turbulent development of the digital technologies in the last few years inevitably led to their usage in all areas of life, including our homes. The technological benefits are demonstrated in the control and management of the so called “Smart House.” By extending our opportunities with the remote controller, which provides an enormous freedom of the user, there also comes the threat of breaking in and taking control of the “Smart House.” This article reviews the cyber threats to the “Smart House” and provides an analysis by using fuzzy estimations for the possible ways of breaking through the system’s defence and interfering with its activities. Various options for preventing cyber threats in such environments are also presented.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">45</style></section></record></records></xml>