Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis.
V. S. NefedovA. A. KriulinM. A. EremeevPublished in: Autom. Control. Comput. Sci. (2021)
Keyphrases
- cluster analysis
- categorical data
- unsupervised learning
- data clustering
- hierarchical latent class models
- factor analysis
- clustering algorithm
- object recognition
- clustering method
- clustering analysis
- k means
- data mining
- correlation analysis
- privacy preserving
- data mining techniques
- fuzzy clustering
- data analysis
- pattern recognition
- neural gas
- knowledge discovery
- fuzzy c means
- partitional clustering
- databases
- database
- active learning
- pairwise
- feature extraction
- image segmentation
- image processing
- information retrieval
- machine learning
- cluster validity index