Login / Signup
Modeling and clustering attacker activities in IoT through machine learning techniques.
Peiyuan Sun
Jianxin Li
Md. Zakirul Alam Bhuiyan
Lihong Wang
Bo Li
Published in:
Inf. Sci. (2019)
Keyphrases
</>
clustering algorithm
k means
clustering method
machine learning
management system
data clustering
modeling method
fuzzy clustering
hierarchical clustering
spectral clustering
information theoretic
high dimensional data
decision trees
outlier detection
anomaly detection
activity recognition
human activities
unsupervised learning
data points
information retrieval
daily life
data mining tasks
data mining