2[10]Portnoy, L., Eskin, E., Stolfo, S. J. Intrusion detection with unlabeled data using clustering. In: Barbara, D ed. Proceedings of ACM CSS Workshop on Data Mining Applied to Security. Philadelphia: ACM Press, 2001.
3[11]Jain, A., Dubes, R. Algorithms for Clustering Data. New Jersey: Prentice-Hall, 1988.
4[12]Selim, S. Z., Ismail, M. A. K-means-type algorithm: generalized convergence theorem and characterization of local optimality. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1984, 6(1): 81-87.
5[13]Tseng, L. Y., Yang, S. B. A genetic approach to the automatic clustering problem. Pattern Recognition, 2001. 34(2): 415-424.
6[14]Babu, G. P., Murty, M. N. Clustering with evolution strategies. Pattern Recognition, 1994, 27(2) 321-329.
7[15]Murthy, C. A., Chowdhury, N. In search of optimal clusters using genetic algorithms. Pattern Recognition Letters, 1996, 17(8): 825-832.