Fuzzy integrated rough set theory situation feature extraction of network security.
Dongmei ZhaoHuiqian SongHong LiPublished in: J. Intell. Fuzzy Syst. (2021)
Keyphrases
- network security
- rough set theory
- fuzzy set theory
- feature extraction
- rough sets
- rule generation
- rough fuzzy
- fuzzy sets
- approximate reasoning
- knowledge reduction
- situation assessment
- intrusion detection
- computer networks
- rule extraction
- intrusion detection system
- attribute reduction
- decision table
- variable precision rough set model
- decision rules
- equivalence relation
- traffic analysis
- imprecise data
- granular computing
- network traffic
- concept lattice
- fuzzy logic
- information security
- information entropy
- membership functions
- knowledge discovery
- fuzzy rough sets
- rough sets theory
- dominance relation
- data analysis
- fuzzy rules
- tool for data mining
- soft computing
- anomaly detection
- image processing
- face recognition
- pattern recognition
- feature selection
- upper approximation
- risk assessment
- approximation spaces
- dimensionality reduction
- feature space
- artificial intelligence
- approximation operators
- situation awareness
- neural network
- discernibility matrix
- information systems
- computer vision
- machine learning
- attribute set
- attribute reduction algorithm
- database