Internet security applications of Gröbner-Shirshov bases

Andrei Kelarev*, John Yearwood, Paul Watters

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

This article is motivated by internet security applications of multiple classifiers designed for the detection of malware. Following a standard approach in data mining, Dazeley et al. (Asian-European J. Math. 2 (2009)(1) 4156) used Gröbner-Shirshov bases to define a family of multiple classifiers and develop an algorithm optimizing their properties. The present article complements and strengthens these results. We consider a broader construction of classifiers and develop a new and more general algorithm for the optimization of their essential properties.

Original languageEnglish
Pages (from-to)435-442
Number of pages8
JournalAsian-European Journal of Mathematics
Volume3
Issue number3
DOIs
Publication statusPublished - Sep 2010
Externally publishedYes

Keywords

  • data mining
  • Gröbner-Shirshov bases
  • internet security

Fingerprint

Dive into the research topics of 'Internet security applications of Gröbner-Shirshov bases'. Together they form a unique fingerprint.

Cite this