Fuzzy mathematical techniques with applications
Fuzzy mathematical techniques with applications
Variable precision rough set model
Journal of Computer and System Sciences
Simulation
Fuzzy set theory—and its applications (3rd ed.)
Fuzzy set theory—and its applications (3rd ed.)
Rough Sets: Theoretical Aspects of Reasoning about Data
Rough Sets: Theoretical Aspects of Reasoning about Data
RSKD '93 Proceedings of the International Workshop on Rough Sets and Knowledge Discovery: Rough Sets, Fuzzy Sets and Knowledge Discovery
An new intrusion detection method based on linear prediction
InfoSecu '04 Proceedings of the 3rd international conference on Information security
NetHost-sensor: Monitoring a target host's application via system calls
Information Security Tech. Report
International Journal of Knowledge-based and Intelligent Engineering Systems - Extended papers selected from KES-2006
A Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
A fast host-based intrusion detection system using rough set theory
Transactions on Rough Sets IV
Hi-index | 0.00 |
Computer are finite discrete machines, the set of real numbers is an infinite continuum. So real numbers in computers are approximation. Rough set theory is the underlying mathematics. A “computer” version of Weistrass theorem states that every sequence, within the radius of error, repeats certain terms infinitely many times. In terms of applications, the theorem guarantees that the audit trail has repeating patterns. Examining further, based on fuzzy-rough set theory, hidden fuzzy relationships (rules) in audit data are uncovered. The information about the repeating data and fuzzy relationships reflect “unconscious patterns” of user's habits. They are some deeper “signatures” of computer users, which provide a foundation to detect abuses and misuses of computer systems. A “sliding window information system” is used to illustrate the detection of a “simple” virus attack. The complexity problem is believed to be controllable via rough set representation of data.