IoT Attacks: Features Identification and Clustering.
Junaid HaseebMasood MansooriHarith Al-SahafIan WelchPublished in: TrustCom (2020)
Keyphrases
- feature set
- feature vectors
- k means
- management system
- security problems
- categorical data
- data points
- image features
- similarity function
- hierarchical clustering
- anomaly detection
- writer identification
- unsupervised feature selection
- big data
- data clustering
- high dimensionality
- information theoretic
- self organizing maps
- clustering method
- neural network
- classification accuracy
- feature space
- similarity measure
- clustering algorithm
- feature selection