Modeling and clustering attacker activities in IoT through machine learning techniques.
Peiyuan SunJianxin LiMd. Zakirul Alam BhuiyanLihong WangBo LiPublished in: Inf. Sci. (2019)
Keyphrases
- clustering algorithm
- k means
- clustering method
- machine learning
- management system
- data clustering
- modeling method
- fuzzy clustering
- hierarchical clustering
- spectral clustering
- information theoretic
- high dimensional data
- decision trees
- outlier detection
- anomaly detection
- activity recognition
- human activities
- unsupervised learning
- data points
- information retrieval
- daily life
- data mining tasks
- data mining