An application of covering approximation spaces on network security.
Xun GePublished in: Comput. Math. Appl. (2010)
Keyphrases
- network security
- approximation spaces
- rough sets
- computer networks
- intrusion detection
- rough set theory
- intrusion detection system
- topological spaces
- traffic analysis
- network traffic
- anomaly detection
- granular computing
- information security
- dos attacks
- network administrators
- anti phishing
- information entropy
- fuzzy sets
- concept lattice
- equivalence relation
- computer vision
- security protection
- approximation operators
- databases
- computational intelligence
- binary relations
- fuzzy logic
- knowledge discovery
- situation assessment
- genetic algorithm
- real world