Learn More
This paper investigates anomaly detection techniques that have been successful for detecting external threats and applies them to the insider threat problem. The "insider threat" involves the actions of a trusted and privileged user who is inappropriately accessing or disseminating sensitive information or otherwise compromising information systems. In(More)
To overcome the limitation of artificial judgment of meibomian gland morphology, we proposed a solution based on an improved fuzzy c-means (FCM) algorithm and rough sets theory. The rough sets reduced the redundant attributes while ensuring classification accuracy, and greatly reduced the amount of computation to achieve information dimension compression(More)
  • 1