An application of covering approximation spaces on network security (Q611449): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.camwa.2010.05.043 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q115100080 / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.camwa.2010.05.043 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2121833433 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rough sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Criteria for choosing a rough set model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rough set approach to incomplete information systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rules in incomplete information systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Knowledge acquisition in incomplete information systems: a rough set approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reduction method for concept lattices based on rough set theory and its application / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4003537 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rough sets: some extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Enhanced Support Vector Machine Model for Intrusion Detection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extensions and intensions in the rough set theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rough set theory for topological spaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3784806 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approximations and reducts with covering generalized rough sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two views of the theory of rough sets in finite universes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructive and algebraic methods of the theory of rough sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relational interpretations of neighborhood operators and rough set approximation operators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4426928 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3346320 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topological approaches to covering rough sets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reduction and axiomization of covering generalized rough sets. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3844856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3994935 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.CAMWA.2010.05.043 / rank
 
Normal rank

Latest revision as of 04:58, 9 December 2024

scientific article
Language Label Description Also known as
English
An application of covering approximation spaces on network security
scientific article

    Statements

    An application of covering approximation spaces on network security (English)
    0 references
    0 references
    14 December 2010
    0 references
    covering approximation space
    0 references
    separation
    0 references
    rough set
    0 references
    network security
    0 references

    Identifiers