Research Article
Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier
Table 10
Outlier detection results on cyber attackers network.
| S. number | Hour of time out | Hour of time in | Result |
| 1 | 7 | 15 | Normal | 2 | 13 | 15 | Normal | 3 | 18 | 16 | Normal | 4 | 1 | 13 | Outlier | 5 | 20 | 10 | Normal | 6 | 8 | 8 | Normal | 7 | 20 | 8 | Normal | 8 | 20 | 19 | Normal | 9 | 7 | 18 | Normal | 10 | 12 | 8 | Normal | 11 | 17 | 11 | Normal | 12 | 10 | 10 | Normal | 13 | 12 | 20 | Normal | 14 | 17 | 17 | Normal | 15 | 20 | 14 | Normal | 16 | 19 | 15 | Normal | 17 | 19 | 17 | Normal | 18 | 13 | 11 | Normal | 19 | 18 | 17 | Normal | 20 | 16 | 15 | Normal | 21 | 21 | 21 | Normal | 22 | 15 | 15 | Normal | 23 | 13 | 13 | Normal | 24 | 20 | 15 | Normal | 25 | 18 | 18 | Normal | 26 | 10 | 19 | Normal | 27 | 18 | 16 | Normal | 28 | 19 | 18 | Normal | 29 | 10 | 16 | Normal | 30 | 1 | 17 | Normal | 31 | 21 | 20 | Normal | 32 | 12 | 20 | Normal | 33 | 22 | 16 | Normal | 34 | 23 | 23 | Normal | 35 | 5 | 23 | Normal | 36 | 9 | 9 | Normal | 37 | 18 | 14 | Normal | 38 | 20 | 8 | Outlier | 39 | 18 | 18 | Normal | 40 | 23 | 17 | Normal | 41 | 23 | 23 | Outlier | 42 | 19 | 15 | Normal | 43 | 12 | 18 | Normal | 44 | 7 | 13 | Normal | 45 | 14 | 9 | Normal | 46 | 21 | 17 | Normal | 47 | 13 | 15 | Normal |
|
|