Clustering for security challenges

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Data science, which includes statistics, probability, data mining, machine learning and natural language processing, is on a major uptrend. Clustering is a key data science method, which does not require labeled data. This tutorial will cover clustering for security challenges. We expect to cover both classical clustering techniques and some of the important, newer clustering algorithms. Examples will be drawn from clustering of malware datasets and phishing emails. Throughout the discussion, we will highlight some of the key unique needs of the security domain that are relevant for clustering techniques.

Cite

CITATION STYLE

APA

Verma, R. M., & Srinivasagopalan, S. (2019). Clustering for security challenges. In IWSPA 2019 - Proceedings of the ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2019 (pp. 1–2). Association for Computing Machinery, Inc. https://doi.org/10.1145/3309182.3309184

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free