Querying cyber-networks using words

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cyber-networks are characterized by two distinct types of nodes—devices and users—and by voluminous interactions in real time. All computational intelligence approaches to the analysis of these networks must deal with complexities of these interactions and their high data rates. This paper describes a computationally feasible approach to querying large cyber-networks using word-based queries. The attribute memberships and connection strengths in these cyber-networks are described granularly using appropriate vocabularies of words, where the words themselves are modeled using interval type-2 (IT2) fuzzy membership functions (MF) on an appropriate scale. By employing precomputation and storage of these word representations and queries, automated monitoring functions in large cyber-networks can be performed in real time via simple arithmetic calculations. We provide an illustrative example using data from a real cyber-network.

Cite

CITATION STYLE

APA

Rickard, J. T., & Ott, A. E. (2016). Querying cyber-networks using words. Studies in Fuzziness and Soft Computing, 342, 255–268. https://doi.org/10.1007/978-3-319-32229-2_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free