2015
DOI: 10.1016/j.ijleo.2014.08.036
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED: Novel heuristic dual-ant clustering algorithm for network intrusion outliers detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Currently available methods can be grouped into three categories: distance-oriented, statistical distribution-oriented, and clustering-oriented approaches. Statistical distribution-oriented methods require the data points under investigation to follow a specific distribution [7], which can then be used to identify outliers. Distance-oriented approaches detect outliers by measuring the number of neighbors a data point has -an outlier is a data point with few neighbors.…”
Section: Introductionmentioning
confidence: 99%
“…Currently available methods can be grouped into three categories: distance-oriented, statistical distribution-oriented, and clustering-oriented approaches. Statistical distribution-oriented methods require the data points under investigation to follow a specific distribution [7], which can then be used to identify outliers. Distance-oriented approaches detect outliers by measuring the number of neighbors a data point has -an outlier is a data point with few neighbors.…”
Section: Introductionmentioning
confidence: 99%
“…Increasingly more consideration from specialists and researchers as of late. Portable distributed computing exploits the incredible registering and capacity abilities of distributed computing, just as the portability and adaptability of versatile terminals, carrying extraordinary comfort to individuals' lives [2]. On the portable cloud stage, the versatile terminal will present the calculation assignment of use programs with a lot of computation and information handling to the remote cloud server farm.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, almost all outlier detection approaches (ODAs) such as firefly algorithm (FA), genetic algorithm and ant algorithm are not valid for ST TD analysis. For instance, Karthikeyan et al [10] developed a hybrid discrete FA for solving multi-objective flexible job shop scheduling problems; Cucina et al [11] discussed a genetic algorithm for the detection of multiple additive outliers in multivariate time series; and Li and Xiao [12] gave a novel heuristic dual-ant clustering algorithm for the detection network intrusion outliers.…”
Section: Introductionmentioning
confidence: 99%