An application of covering approximation spaces on network security
From MaRDI portal
Publication:611449
DOI10.1016/J.CAMWA.2010.05.043zbMath1201.68025OpenAlexW2121833433WikidataQ115100080 ScholiaQ115100080MaRDI QIDQ611449
Publication date: 14 December 2010
Published in: Computers \& Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2010.05.043
Deterministic network models in operations research (90B10) Theory of fuzzy sets, etc. (03E72) Network protocols (68M12)
Related Items (10)
Invariance of separation in covering approximation spaces ⋮ A New Type of Covering-Based Rough Sets ⋮ On generalizing covering approximation space ⋮ Topological structure of generalized rough sets ⋮ Characterizations of coverings for upper approximation operators being closure operators ⋮ The characterizations of upper approximation operators based on special coverings ⋮ Topological characterizations of covering for special covering-based upper approximation operators ⋮ The characterizations of upper approximation operators based on coverings ⋮ Approximation operator based on neighborhood systems ⋮ On the connectivity of wireless network systems and an application in teacher-student interactive platforms
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Topological approaches to covering rough sets
- Rough sets: some extensions
- Approximations and reducts with covering generalized rough sets
- Criteria for choosing a rough set model
- Extensions and intensions in the rough set theory
- Constructive and algebraic methods of the theory of rough sets
- Reduction and axiomization of covering generalized rough sets.
- Two views of the theory of rough sets in finite universes
- Relational interpretations of neighborhood operators and rough set approximation operators
- Rough set approach to incomplete information systems
- Rules in incomplete information systems
- Reduction method for concept lattices based on rough set theory and its application
- Rough set theory for topological spaces
- Knowledge acquisition in incomplete information systems: a rough set approach
- Rough sets
- An Enhanced Support Vector Machine Model for Intrusion Detection
This page was built for publication: An application of covering approximation spaces on network security