Ahmad Ghadiri

Learn More
Automatic detection of network intrusion is a challenging task because of increasing types of attacks. Many of the existing approaches either are rigid, inflexible designs tailored to a specific situation or require manual setting of design parameters such as the initial number of clusters. In this paper we allow the design parameters to be determined(More)
  • 1