Methodology for a Security Dependability Adaptive Protection Scheme Based on Data Mining
Methodology for a Security Dependability Adaptive Protection Scheme Based on Data Mining

Method to determine a in rough set model based on connection degree
Method to determine a in rough set model based on connection degree