The Application of Rough Sets on Network Intrusion Detection | IEEE Conference Publication | IEEE Xplore