Applicability of rough set technique for data investigation and optimization of intrusion detection system

SS Roy, VM Viswanatham, PV Krishna, N Saraf… - … , Reliability, Security and …, 2013 - Springer
The very idea of intrusion detection can be perceived through the hasty advancement
following the expansion and revolution of artificial intelligence and soft computing. Thus, in …

Multicriteria decision examination for electrical power grid monitoring system

SS Roy, VM Viswanatham… - 2013 7th International …, 2013 - ieeexplore.ieee.org
Rough Set theory proposed by Z Pawlak is a great help for dealing with uncertain data and
dominance based rough set is an extension to the classical rough set theory considering the …

Determination of network vulnerability factor using rough set

S Saxena, A Kumar, SS Roy - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Vulnerability of a Network (can be an office LAN or computer systems connected together for
secure data communication) is defined as susceptibility of a network for a successful …