Login / Signup
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis.
Scott Knight
Luciano Carosielli
Published in:
SEC (2003)
Keyphrases
</>
outlier detection
unlabelled data
clustering method
data sets
machine learning
clustering algorithm
decision trees
learning process
unsupervised learning