Interval and Fuzzy Techniques in Business-Related Computer Security : Intrusion Detection , Privacy Protection

@inproceedings{Beheshti2006IntervalAF,
  title={Interval and Fuzzy Techniques in Business-Related Computer Security : Intrusion Detection , Privacy Protection},
  author={Mohsen Beheshti and Jianchao Han and Luc Longpr{\'e} and Scott A. Starks and J. Ivan Vargas and Gang Xiang},
  year={2006}
}
E-commerce plays an increasingly large role in business. As a result, business-related computer security becomes more and more important. In this talk, we describe how interval and fuzzy techniques can help in solving related computer security problems. 1 Interval Techniques in Computer Security: Motivations Importance of computer security. E-commerce plays… CONTINUE READING