References
- L. Protnoy, E, Eskin, and S. Stolfo, "Intrusion detection with unlabeled data using clustering," in Proceedings of ACM CSS Workshop on Data Mining Applied to Security, pp. 1-14, 2001.
- KDD cup 1999 data, Available http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
- Y. Liu, Z. Wang, and Y. Feng, "DoS intrusion detection based on incremental learning with support vector machines," Computer Engineering, vol. 32, no. 4, pp. 179- 186, 2006.
- M. P. O'Mahony, N. J. Hurley, and G. C. Silvestre, "Recommender systems: attack types and strategies," in Proceedings of the 20th National Conference on Artificial Intelligence (AAAI-05), Pittsburgh, PA, 2005, pp. 334- 339.
- M. Sabhnani and G. Serpen, "KDD feature set complaint heuristic rules for R2L attack detection," in Security and Management, H. R. Arabnia and Y Mun, Eds. Lasvegas: CSREA Press, 2003, pp. 310-316.
- M. Birker-Robaczewska, C. Boukhadra, R. Studer, C. Mueller, C. Binkert, and O. Nayler, "The expression of urotensin II receptor (U2R) is up-regulated by interferongamma," Journal of Receptors and Signal Transduction, vol. 23, no. 4, pp. 289-305, 2003. https://doi.org/10.1081/RRS-120026972
- I. T. Jolliffe. Principal Component Analysis, 2nd ed., New York: Springer, 2002.
- J. H. Min and F. C. H. Rhee, "An interval type-2 fuzzy PCM algorithm for pattern recognition," Journal of The Korean Institute of Intelligent Systems, vol. 19, no. 1, pp. 102-107, 2009. https://doi.org/10.5391/JKIIS.2009.19.1.102
- B. Y. Kang and D. W. Kim, "VS-FCM: validity-guided spatial fuzzy C-means clustering for image segmentation," International Journal of Fuzzy Logic and Intelligent Systems, vol. 10, no. 1, pp. 89-93, Mar. 2010. http://dx.doi.org/10.5391/IJFIS.2010.10.1.089
- J. C. Bezdek, Pattern Recognition with Fuzzy Objective Function Algorithms, New York: Plenum Press, 1983.
- D. H. Park, S. Ryu, P. H. Jeong, and S. K. Lee, "Application of similarity measure for fuzzy C-means clustering to power system management," International Journal of Fuzzy Logic and Intelligent Systems, vol. 8, no. 1, pp. 18-23,Mar. 2008. https://doi.org/10.5391/IJFIS.2008.8.1.018
- R. Nock and F. Nielsen, "On weighting clustering," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 8, pp. 1223-1235, Aug. 2006. http: //dx.doi.org/10.1109/TPAMI.2006.168
- G. Hamerly and C. Elkan, "Alternatives to the k-means algorithm that find better clusterings," in Proceedings of the 11th International Conference on Information and Knowledge Management, New York, 2002, pp. 600-607. http://dx.doi.org/10.1145/584792.584890
- H. T. Kim, J. H. Lee, and C. W. Ahn, "A recommender system based on interactive evolutionary computation with data grouping," Procedia Computer Science, vol. 3, pp. 611-616, 2011. http://dx.doi.org/10.1016/j.procs.2010.12. 102
- W. Li, "Using Genetic Algorithm for network intrusion detection," in Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas, 2004, pp. 24-27.
- D. Beasley, D. R. Bull, and R. R. Martin, "An overview of genetic algorithms: part 1. fundamentals," University Computing, vol. 15, no. 2, pp. 58-69, 1993.
- M. Srinivas and L. M. Patnaik, "Adaptive probabilities of crossover and mutation in genetic algorithms," IEEE Transactions on Systems, Man and Cybernetics, vol. 24, no. 4, pp. 656-667, Apr. 1994. http://dx.doi.org/10.1109/ 21.286385
- J. H. Min and F. C. H. Rhee, "An interval type-2 fuzzy PCM algorithm for pattern recognition," Journal of The Korean Institute of Intelligent Systems, vol. 19, no. 1, pp. 102-107, Feb. 2009. http://dx.doi.org/10.5391/JKIIS.2009. 19.1.102
- H. C. Jeong, S. T. Seo, I. K. Lee, and S. H. Kwon, "Clustering method for reduction of cluster center distortion," Journal of The Korean Institute of Intelligent Systems, vol. 18, no. 3, pp. 354-359, Jun. 2008. http: //dx.doi.org/10.5391/JKIIS.2008.18.3.354
- J. W. Han, S. H. Jun, and K. W. Oh, "Cluster merging using enhanced density based fuzzy C-means clustering algorithm," Journal of The Korean Institute of Intelligent Systems, vol. 14, no. 5, pp. 517-524, Aug. 2004. http: //dx.doi.org/10.5391/JKIIS.2004.14.5.517