Approximate reduced model based on mutual information for security assessment

被引:0
|
作者
Li, Wei [1 ]
Fan, Ming-Yu [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
来源
Kongzhi yu Juece/Control and Decision | 2010年 / 25卷 / 09期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Redundancy
引用
收藏
页码:1426 / 1430
相关论文
共 50 条
  • [21] A Graph Model for Clustering Based on Mutual Information
    Yoshida, Tetsuya
    PRICAI 2010: TRENDS IN ARTIFICIAL INTELLIGENCE, 2010, 6230 : 339 - 350
  • [22] Blind Image Quality Assessment Based on Mutual Information
    Liu, Bao
    Liu, Li-Xiong
    Dong, Hong-Ping
    Lin, Yong-Gang
    ELECTRONICS, COMMUNICATIONS AND NETWORKS V, 2016, 382 : 127 - 136
  • [23] A Feature Selection Algorithm Based on Approximate Markov Blanket and Dynamic Mutual Information
    Wang, Xiaodan
    Yao, Xu
    Zhang, Yuxi
    Lei, Lei
    INTELLIGENT SCIENCE AND INTELLIGENT DATA ENGINEERING, ISCIDE 2011, 2012, 7202 : 226 - 233
  • [24] Efficient approximate top-k mutual information based feature selection
    Salam, Md Abdus
    Roy, Senjuti Basu
    Das, Gautam
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2023, 61 (01) : 191 - 223
  • [25] Ranking Mutual Information Dependencies in a Summary-based Approximate Analytics Framework
    Slezak, Dominik
    Borkowski, Janusz
    Chadzynska-Krasowska, Agnieszka
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 852 - 859
  • [26] Efficient approximate top-k mutual information based feature selection
    Md Abdus Salam
    Senjuti Basu Roy
    Gautam Das
    Journal of Intelligent Information Systems, 2023, 61 : 191 - 223
  • [27] A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
    Saini Das
    Arunabha Mukhopadhyay
    Debashis Saha
    Samir Sadhukhan
    Information Systems Frontiers, 2019, 21 : 959 - 977
  • [28] Model of information security risk assessment based on improved wavelet neural network
    Chen, Gang
    Zhao, Dawei
    Journal of Networks, 2013, 8 (09) : 2093 - 2100
  • [29] Compliance determination based CME information system security risk assessment model
    Zhang, Xueqin
    Jiang, Changqin
    Xu, Cuihua
    Lin, Jiajun
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1560 - 1565
  • [30] An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
    Wu, Kehe
    Ye, Shichao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 833 - 838