A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory.
Rodrigo BrancoKekai HuHenrique KawakamiKe SunPublished in: IEEE Symposium on Security and Privacy Workshops (2018)
Keyphrases
- set theory
- mathematical modeling
- fuzzy set theory
- first order logic
- partial order
- mathematical models
- computational intelligence
- mathematical model
- fuzzy sets
- discrete event
- systems biology
- ordinary differential equations
- rough sets
- mathematical morphology
- machine learning
- rough set theory
- neural network
- probability theory
- expert systems
- high throughput
- inference rules
- real time
- probabilistic model
- databases