Research Article
Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network
| Input: , number of neighbors k, a set of seeds | | Output: A set of detected clusters/outliers | | PROCESS: | (1) | Constructing the k-NN graph of | (2) | | (3) | repeat | (4) | Constructing the connected components using the threshold θ | (5) | | (6) | until the cut condition is satisfied | (7) | Propagating the labels to form the principal clusters | (8) | Constructing the final clusters |
|