Skip to main content
Article thumbnail
Location of Repository

Interval and Fuzzy Techniques in Business-Related Computer Security: Intrusion Detection

By Mohsen Beheshti, Jianchao Han, Luc Longpré, Scott A. Starks, J. Ivan Vargas and Gang Xiang

Abstract

Abstract. E-commerce plays an increasingly large role in business. As a result, business-related computer security becomes more and more important. In this talk, we describe how interval and fuzzy techniques can help in solving related computer security problems. 1 Interval Techniques in Computer Security: Motivations Importance of computer security. E-commerce plays an increasingly large role in business. As a result, business-related computer security becomes more and more important; see, e.g., [2, 16]. Why interval techniques. In computer security, interval uncertainty comes from the lack of knowledge. One of the reasons for this lack of knowledge is that the users are reluctant to provide the businesses with the exact information because they do not want this information to be misused. For example, a user may be reluctant to provide his or her exact date of birth but willing to provide an age interval (e.g., 30–40). To be successful, an electronic business needs to process the user data. It i

Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.183.2534
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.cs.utep.edu/vladik/... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.