Internet security applications of Gröbner-Shirshov bases

Andrei Kelarev*, John Yearwood, Paul Watters

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


This article is motivated by internet security applications of multiple classifiers designed for the detection of malware. Following a standard approach in data mining, Dazeley et al. (Asian-European J. Math. 2 (2009)(1) 4156) used Gröbner-Shirshov bases to define a family of multiple classifiers and develop an algorithm optimizing their properties. The present article complements and strengthens these results. We consider a broader construction of classifiers and develop a new and more general algorithm for the optimization of their essential properties.

Original languageEnglish
Pages (from-to)435-442
Number of pages8
JournalAsian-European Journal of Mathematics
Issue number3
Publication statusPublished - Sept 2010
Externally publishedYes


  • data mining
  • Gröbner-Shirshov bases
  • internet security


Dive into the research topics of 'Internet security applications of Gröbner-Shirshov bases'. Together they form a unique fingerprint.

Cite this