Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alefeld, G., Herzberger, J.: Introduction to Interval Computations. Academic Press Inc., New York (1983). Translation by J. Rokne from the original German “Einführung In Die Intervallrechnung”
Bace, R., Mell, P.: NIST special publication on intrusion detection system. Technical report, NIST (National Institute of Standards and Technology) (2001). http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf.
Berleant, D., Cheong, M.P., Chu, C.C.N., Guan, Y., Kamal, A., Sheble, G., Ferson, S., Peters, J.F.: Dependable handling of uncertainty. Reliable Computing 9(6), 407–418 (2003)
de Korvin, A., Hu, C., Chen, P.: Generating and applying rules for interval valued fuzzy observations. In: Z.R. Yang, R.M. Everson, H. Yin (eds.) Intelligent Data Engineering and Automated Learning, Lecture Notes in Computer Science, Vol. 3177, pp. 279–284. Springer-Verlag, Heidelberg (2004)
de Korvin, A., Hu, C., Sirisaengtaksin, O.: On firing rules of fuzzy sets of type II. Applied Mathematics 3, 151-159 (2000)
Duan, Q., Hu, C., Wei, H.C.: Enhancing network intrusion detection systems with interval methods. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1444–1448 (2005)
Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Machine Learning Research 3, 1157–1182 (2003)
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. Software Engineering 21(3), 181–199 (1995)
Jang, J.S.R.: ANFIS: Adaptive-network-based fuzzy inference system. IEEE Transactions on Systems, Man, and Cybernetics 23, 665–684 (1993)
Julisch, K.: Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Securroty 6(4), 443–471 (2003)
Mendel, J.: Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions. Prentice-Hall, Upper Saddle River, NJ (2001)
Pawlak, Z.: Rough sets and fuzzy sets. Fuzzy Sets and Systems 17, 99–102 (1985)
Seleznyov, A., Puuronen, S.: Anomaly intrusion detection systems: Handling temporal relations between events. In: Proceedings of Recent Advances in Intrusion Detection, West Lafayette, IN (1999). http://www.raid-symposium.org/raid99/PAPERS/Seleznyov.pdf
Shary, S.P.: A new technique in systems analysis under interval uncertainty and ambiguity. Reliable Computing 8(5), 321–418 (2002)
Zadeh, L.A.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Transactions on Systems, Man, and Cybernetics SMC-3, 28–44 (1973)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag London
About this chapter
Cite this chapter
Hu, C. (2008). Interval Rule Matrices for Decision Making. In: Kreinovich, V., Korvin, A., Baker Kearfott, R., Hu, C. (eds) Knowledge Processing with Interval and Soft Computing. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-84800-326-2_6
Download citation
DOI: https://doi.org/10.1007/978-1-84800-326-2_6
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84800-325-5
Online ISBN: 978-1-84800-326-2
eBook Packages: Computer ScienceComputer Science (R0)