Journal of Information Security

Vol.9 No.1(2018), Paper ID 81756, 15 pages

DOI:10.4236/jis.2018.91006

 

On the Use of k-NN in Anomaly Detection

 

Theocharis Tsigkritis, George Groumas, Moti Schneider

 

PCCW Global, Athens, Greece
PCCW Global, Athens, Greece
PCCW Global, Athens, Greece

 

Copyright © 2018 Theocharis Tsigkritis, George Groumas, Moti Schneider et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


Tsigkritis, T. , Groumas, G. and Schneider, M. (2018) On the Use of k-NN in Anomaly Detection. Journal of Information Security, 9, 70-84. doi: 10.4236/jis.2018.91006.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.