Research Article
Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network
| | Input: , number of neighbors k, a set of seeds | | | Output: A set of detected clusters/outliers | | | PROCESS: | | (1) | Constructing the k-NN graph of | | (2) | | | (3) | repeat | | (4) | Constructing the connected components using the threshold θ | | (5) | | | (6) | until the cut condition is satisfied | | (7) | Propagating the labels to form the principal clusters | | (8) | Constructing the final clusters |
|