Archive > Volume 28 Issue 7 > 2005,28(7):74-77. DOI:10.11835/j.issn.1000-582X.2005.07.020 CSTR:[cstr] Prev Next

Fuzzy Clustering Theory for Analyzing Intrusion Detection Data