A practical approach for clustering large data flows of malicious URLs.
Adrian-Stefan PopescuDragos Teodor GavrilutDaniel-Ionut IrimiaPublished in: J. Comput. Virol. Hacking Tech. (2016)
Keyphrases
- data sets
- original data
- data points
- data collection
- raw data
- missing data
- data analysis
- database
- data processing
- clustering analysis
- high quality
- data objects
- synthetic data
- statistical analysis
- small number
- input data
- training data
- clustering method
- high dimensional data
- probability distribution
- multidimensional data
- data distribution
- end users
- spectral clustering
- hierarchical clustering
- data sources
- categorical data
- data quality
- information retrieval
- search engine
- website
- knowledge discovery