Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
It has already been noted that the accurate prediction of societal responses requires the use of a formal model based on some social or cultural taxonomy. One such taxonomic candi...
Adnan Yazici, Frederick E. Petry, Curt Pendergraft
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Induction of decision rules within the dominance-based rough set approach to the multiple-criteria sorting decision problem is discussed in this paper. We introduce an algorithm ca...
Salvatore Greco, Benedetto Matarazzo, Roman Slowin...
In fuzzy modeling (FM), the quantity and quality of the training set is crucial to properly grasp the behavior of the system being modeled. However, the available data are often n...
Pablo Carmona, Juan Luis Castro, Jose Manuel Zurit...