no code implementations • 29 Jul 2021 • Michalis Kallitsis, Vasant Honavar, Rupesh Prajapati, Dinghao Wu, John Yen
Network telescopes or "Darknets" provide a unique window into Internet-wide malicious activities associated with malware propagation, denial of service attacks, scanning performed for network reconnaissance, and others.
no code implementations • 27 Mar 2013 • John Yen
In this paper, we describe a generalized theory of evidence where the degree of belief in a fuzzy set is obtained by minimizing the probability of the fuzzy set under the constraints imposed by a basic probability assignment.
no code implementations • 27 Mar 2013 • John Yen
Dempster's rule of combination has been the most controversial part of the Dempster-Shafer (D-S) theory.
no code implementations • 27 Mar 2013 • John Yen, Piero P. Bonissone
The objective of this research is to bring together two complementary knowledge representation schemes: term subsumption languages, which represent and reason about defining characteristics of concepts, and proximate reasoning models, which deal with uncertain knowledge and data in expert systems.
no code implementations • 27 Mar 2013 • John Yen
The Dempster-Shafer theory has been extended recently for its application to expert systems.