×
Abstract. Cybersecurity has a lot of challenging problems, from intrusion to ille- gal actions and destruction. These challenges have attracted so many ...
People also ask
In this study, by taking the advantage of Granular Computing and Big Data, an improved k-means information granulation framework that incorporate similarity ...
In multiple cases, the techniques of GrC allow for an increase in efficiency and calculating speed, better data legibility and improvements in the performance ...
A consolidated approach based on the Granular Computing information processing paradigm applied to sequences of WiFi frames.
Jan 16, 2019 · In this paper we have proposed using the elegant theory of Granular Computing (GC) as the new approach to cybersecurity and network anomaly ...
Aug 8, 2024 · This very paper puts forward a novel approach to the detection of cyberattacks taking inventory of the practical application of information ...
It focuses on obtaining a structured solution to problems by describing and understanding the granular structure of the problem at multiple levels. Additionally ...
Missing: Cybersecurity | Show results with:Cybersecurity
Jan 16, 2019 · cybersecurity and anomaly detection approaches, Section 3 discusses the application of granular computing in cyber- security, and Section 4 ...
A novel approach to the detection of cyberattacks taking inventory of the practical application of information granules from network data is put forward, ...
Granular Computing (GrC) is a general computation theory for effectively using granules such as classes, clusters, subsets, groups, and intervals.
Missing: Problem. | Show results with:Problem.