Research Article
Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network
Table 4
The parameters used in data sets.
| ||||||||||||||||||||||||||||||||||||
k: the number of nearest neighbors; nc: number of cluster used; θ: the threshold. |
| ||||||||||||||||||||||||||||||||||||
k: the number of nearest neighbors; nc: number of cluster used; θ: the threshold. |