A rough set theory based method for anomaly intrusion detection in computer network systems.
Zhongmin CaiXiaohong GuanPing ShaoQingke PengGuoji SunPublished in: Expert Syst. J. Knowl. Eng. (2003)
Keyphrases
- rough set theory
- computer networks
- computer systems
- tool for data mining
- decision rules
- neural network
- knowledge discovery
- rough sets
- rough set model
- data analysis
- artificial intelligence
- classification accuracy
- variable precision rough set model
- rule extraction
- granular computing
- fuzzy set theory
- information systems
- feature extraction
- classification algorithm
- intrusion detection
- preprocessing
- text classification
- support vector machine