APPLICATION OF TECHNIQUES OF CLASTER ANALYSIS TROUBLESHOOTING SYSTEMS
Keywords:
information security, cluster analysis, detection systemsAbstract
This paper presents applications of cluster analysis techniques for the realization of a behavioral analysis violation detection system. By applying K-signaling clustering, data is broken down and classified for the actions performed in the observed system, detecting actions resulting from security policy violations
Downloads
Download data is not yet available.
References
Downloads
Published
2018-05-16
Issue
Section
Computer Science and Communications - Reviewed Publications. ISSN: 1314-7846
License
Articles published in "Computer Science and Communications" Magazine are licensed under Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
APPLICATION OF TECHNIQUES OF CLASTER ANALYSIS TROUBLESHOOTING SYSTEMS. (2018). COMPUTER SCIENCES AND COMMUNICATIONS, 1(1), 42-47. https://csc.bfu.bg/index.php/CSC/article/view/28