Research Article

Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing

Table 1

Notations used.

NotationDescription

Number of documents
Number of topics
Number of words in the -th document
Vocabulary list
The corpus of documents
The -th document
The -th word in the -th document
A matrix, the topic distribution of the whole corpus
A vector, the topic distribution of the -th document
A matrix; column denotes the topic-word distribution of the -th topic
A vector, the word distribution of the -th topic
The topic label of ,