The 2013 International Joint Conference on Neural Networks (IJCNN) 2013
DOI: 10.1109/ijcnn.2013.6706774
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive clustering algorithm for efficient cybersecurity applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0
4

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(17 citation statements)
references
References 10 publications
0
13
0
4
Order By: Relevance
“…Examples include the olfactory bulb, hippocampal regions, and the prepyriform cortex [20]. KII has four types of interactions: excitatory-excitatory, inhibitory-inhibitory, excitatoryinhibitory, and inhibitory-excitatory [14].…”
Section: Kii Setsmentioning
confidence: 99%
See 3 more Smart Citations
“…Examples include the olfactory bulb, hippocampal regions, and the prepyriform cortex [20]. KII has four types of interactions: excitatory-excitatory, inhibitory-inhibitory, excitatoryinhibitory, and inhibitory-excitatory [14].…”
Section: Kii Setsmentioning
confidence: 99%
“…Transitions from point attractor to limit cycle attractor can be achieved through a suitable level of feedback gain or by input stimuli. Systematic analysis has identified regions of stability and transitions between limit cycle and fixed point dynamics [20].…”
Section: Kii Setsmentioning
confidence: 99%
See 2 more Smart Citations
“…The interaction between populations of inverse polarities makes the KII form several types of oscillators according with the configuration of its connections [12]. The type of attractor formed varies greatly from the weight parameters.…”
Section: A K-set Hierarchymentioning
confidence: 99%