Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.
Jianyi LiuKeyi LiYang LiRu ZhangXi DuanPublished in: IIH-MSP (2) (2018)
Keyphrases
- fuzzy clustering
- mining algorithm
- fuzzy c means
- fuzzy clustering algorithm
- association rules
- pattern mining
- association rule mining
- frequent subsequences
- artificial intelligence
- fuzzy clustering algorithms
- pattern discovery
- sequential patterns
- tree structure
- clustering analysis
- periodic patterns
- frequent patterns
- fuzzy clustering method
- control system
- pattern recognition