Keyphrases
- computer security
- computer systems
- anomaly detection
- fuzzy sets
- network security
- evaluation method
- ahp method
- information security
- fuzzy clustering
- network intrusion detection
- database
- semi supervised
- intrusion detection
- membership functions
- fuzzy comprehensive evaluation model
- fuzzy numbers
- fuzzy rules
- query processing