Searched for: subject%3A%22Sequence%255C+Clustering%22
(1 - 6 of 6)
document
Budel, G.J.A. (author), Frasincar, Flavius (author), Boekestijn, David (author)
Sequence data mining has become an increasingly popular research topic as the availability of data has grown rapidly over the past decades. Sequence clustering is a type of method within this field that is in high demand in the industry, but the sequence clustering problem is non-trivial and, as opposed to static cluster analysis,...
journal article 2024
document
Nadeem, A. (author), Verwer, S.E. (author)
Sequence clustering in a streaming environment is challenging because it is computationally expensive, and the sequences may evolve over time. K-medoids or Partitioning Around Medoids (PAM) is commonly used to cluster sequences since it supports alignment-based distances, and the k-centers being actual data items helps with cluster...
conference paper 2023
document
Al-Obaidi, Rami (author)
Clustering is a group of (unsupervised) machine learning algorithms used to categorize data into clusters. The most popular clustering algorithm is k-means clustering. K-means clustering clusters the data into k clusters where a cluster is represented by the mean of the data points called a centroid. Instead of using the mean as a centroid, a...
bachelor thesis 2021
document
Nadeem, A. (author), Hammerschmidt, C.A. (author), Hernandez Ganan, C. (author), Verwer, S.E. (author)
Malware family labels are known to be inconsistent. They are also black-box since they do not represent the capabilities of malware. The current state of the art in malware capability assessment includes mostly manual approaches, which are infeasible due to the ever-increasing volume of discovered malware samples. We propose a novel...
book chapter 2021
document
Nadeem, Azqa (author)
Developing malware variants is extremely cheap for attackers because of the availability of various obfuscation tools. These variants can be grouped in malware families, based on information retrieved from their static and dynamic analysis. Dynamic, network-level analysis of malware shows its core behavior since it captures the interaction with...
master thesis 2018
document
Zhang, Yihuan (author), Lin, Q. (author), Wang, Jun (author), Verwer, S.E. (author)
Learning driving behavior is fundamental for autonomous vehicles to “understand” traffic situations. This paper proposes a novel method for learning a behavioral model of car-following using automata learning algorithms. The model is interpretable for car-following behavior analysis. Frequent common state sequences are extracted from the model...
conference paper 2017
Searched for: subject%3A%22Sequence%255C+Clustering%22
(1 - 6 of 6)