Journal of Information Security
Vol.9 No.1(2018), Paper ID 81756, 15 pages
DOI:10.4236/jis.2018.91006
On the Use of k-NN in Anomaly Detection
Theocharis Tsigkritis, George Groumas, Moti Schneider
PCCW Global, Athens, Greece PCCW Global, Athens, Greece PCCW Global, Athens, Greece
Copyright © 2018 Theocharis Tsigkritis, George Groumas, Moti Schneider et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
How to Cite this Article
Download citation as EndNote
Copyright © 2024 by authors and Scientific Research Publishing Inc.
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.