共 50 条
- [1] Network Security Evaluation Research Based on Rough Set Theory [J]. 2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 1, 2011, : 302 - 304
- [2] Study on Assessment Method for Computer Network Security Based on Rough set [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 617 - +
- [3] Method on network information system security assessment based on rough set [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 1041 - +
- [4] Method of scores analysis based on Rough Set Theory [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 259 - 261
- [5] Rough set based solutions for network security [J]. MONITORING, SECURITY, AND RESCUE TECHNIQUES IN MULTIAGENT SYSTEMS, 2005, : 455 - 465
- [6] Rough Set Theory based Hybrid Method for Network Intrusion Detection [J]. MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 815 - 818
- [7] A method of constructing fuzzy neural network based on rough set theory [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1723 - 1728
- [8] Network Teaching Resource Evaluation Method Based on Rough Set Theory [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 188 - 192
- [9] An Analysis Method of Landing Safety Based on Rough Set Theory [J]. 2012 PROCEEDINGS - ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS), 2012,