An application of covering approximation spaces on network security
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3880694 (Why is no real title available?)
- scientific article; zbMATH DE number 4046636 (Why is no real title available?)
- scientific article; zbMATH DE number 3177268 (Why is no real title available?)
- scientific article; zbMATH DE number 42114 (Why is no real title available?)
- scientific article; zbMATH DE number 53312 (Why is no real title available?)
- scientific article; zbMATH DE number 1983063 (Why is no real title available?)
- An Enhanced Support Vector Machine Model for Intrusion Detection
- Approximations and reducts with covering generalized rough sets
- Constructive and algebraic methods of the theory of rough sets
- Criteria for choosing a rough set model
- Extensions and intensions in the rough set theory
- Knowledge acquisition in incomplete information systems: a rough set approach
- Reduction and axiomization of covering generalized rough sets.
- Reduction method for concept lattices based on rough set theory and its application
- Relational interpretations of neighborhood operators and rough set approximation operators
- Rough set approach to incomplete information systems
- Rough set theory for topological spaces
- Rough sets
- Rough sets: some extensions
- Rules in incomplete information systems
- Topological approaches to covering rough sets
- Two views of the theory of rough sets in finite universes
Cited in
(12)- Topological structure of generalized rough sets
- On generalizing covering approximation space
- Characterizations of coverings for upper approximation operators being closure operators
- On the connectivity of wireless network systems and an application in teacher-student interactive platforms
- Invariance of separation in covering approximation spaces
- Approximation operator based on neighborhood systems
- The characterizations of upper approximation operators based on coverings
- A Gröbner-Shirshov algorithm for applications in internet security
- Topological characterizations of covering for special covering-based upper approximation operators
- A new type of covering-based rough sets
- The characterizations of upper approximation operators based on special coverings
- A Review of Several Optimization Problems Related to Security in Networked System
This page was built for publication: An application of covering approximation spaces on network security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q611449)