{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:35:51Z","timestamp":1774449351674,"version":"3.50.1"},"reference-count":28,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:00:00Z","timestamp":1556409600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2019,4,28]]},"abstract":"<jats:p>The aim of machine learning is to develop algorithms that can learn from data and solve specific problems in some context as human do. This paper presents some machine learning models applied to the intrusion detection system in WiFi network. Firstly, we present an incremental semisupervised clustering based on a graph. Incremental clustering or one-pass clustering is very useful when we work with data stream or dynamic data. In fact, for traditional clustering such as K-means, Fuzzy C-Means, DBSCAN, etc., many versions of incremental clustering have been developed. However, to the best of our knowledge, there is no incremental semisupervised clustering in the literature. Secondly, by combining a K-means algorithm and a measure of local density score, we propose a fast outlier detection algorithm, named FLDS. The complexity of FLDS is <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mrow><mml:mi>O<\/mml:mi><mml:mfenced open=\"(\" close=\")\" separators=\"|\"><mml:mrow><mml:msup><mml:mrow><mml:mi>n<\/mml:mi><\/mml:mrow><mml:mrow><mml:mn>1.5<\/mml:mn><\/mml:mrow><\/mml:msup><\/mml:mrow><\/mml:mfenced><\/mml:mrow><\/mml:math> while the results obtained are comparable with the algorithm LOF. Thirdly, we introduce a multistage system-based machine learning techniques for mining the intrusion detection data applied for the 802.11 WiFi network. Finally, experiments conducted on some data sets extracted from the 802.11 networks and UCI data sets show the effectiveness of our new proposed methods.<\/jats:p>","DOI":"10.1155\/2019\/4708201","type":"journal-article","created":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T23:31:21Z","timestamp":1556494281000},"page":"1-13","source":"Crossref","is-referenced-by-count":10,"title":["Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8830-9023","authenticated-orcid":true,"given":"Vu Viet","family":"Thang","sequence":"first","affiliation":[{"name":"Moscow Institute of Physics and Technology (State University), Moscow, Russia"}]},{"given":"F. F.","family":"Pashchenko","sequence":"additional","affiliation":[{"name":"The Department of Information and Communication Technologies, MIPT (State University), Moscow, Russia"},{"name":"Trapeznikov Institute of Control Sciences, Russian Academy of Sciences, Moscow, Russia"}]}],"member":"311","reference":[{"key":"1","year":"2012"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6383145"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2048302"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.12.048"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.05.017"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1332-7"},{"key":"8","volume-title":"Detecting impersonation attack in WiFi networks using deep learning approach","volume":"10144","year":"2016"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2402161"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.10.018"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2015.2499200"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050006"},{"key":"27","volume-title":"Constrained clustering: advances in algorithms, theory, and applications","year":"2008"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.10.013"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2796999"},{"issue":"3","key":"30","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1016\/j.patcog.2014.09.008","volume":"48","year":"2015","journal-title":"Pattern Recognition"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2013.22"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0103-4"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-008-5084-4"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.3233\/ida-163296"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0291-9"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0191-9"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.10.012"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-009-0216-0"},{"key":"43","year":"2015"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/2.781637"}],"updated-by":[{"DOI":"10.1155\/2020\/6576725","type":"corrigendum","label":"Corrigendum","source":"publisher","updated":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T00:00:00Z","timestamp":1599523200000}}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2019\/4708201.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2019\/4708201.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2019\/4708201.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T23:31:42Z","timestamp":1599607902000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jcnc\/2019\/4708201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,28]]},"references-count":28,"alternative-id":["4708201","4708201"],"URL":"https:\/\/doi.org\/10.1155\/2019\/4708201","relation":{"corrigendum":[{"id-type":"doi","id":"10.1155\/2020\/6576725","asserted-by":"object"}]},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"value":"2090-7141","type":"print"},{"value":"2090-715X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,28]]}}}