Difference between revisions of "Anomaly Detection"
| Line 8: | Line 8: | ||
[http://www.google.com/search?q=cyber+security+anomaly+detection+defense+ai+deep+machine+learning+ML+artificial+intelligence ...Google search] | [http://www.google.com/search?q=cyber+security+anomaly+detection+defense+ai+deep+machine+learning+ML+artificial+intelligence ...Google search] | ||
| − | * [[ | + | * [[Case Studies]] |
| − | ** [[Cybersecurity | + | ** [[Risk, Compliance and Regulation]] |
| − | ** [[ | + | *** [[Cybersecurity]] |
| + | ** [[Government Services]] | ||
* [[...find outliers]] | * [[...find outliers]] | ||
| − | |||
* [[Capabilities]] | * [[Capabilities]] | ||
| + | * [[Cybersecurity References]] | ||
| + | * [[Offense - Adversarial Threats/Attacks]] | ||
* [[Defenses Against Adversarial Attacks]] | * [[Defenses Against Adversarial Attacks]] | ||
* [http://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang] | * [http://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang] | ||
Revision as of 07:41, 15 July 2020
Youtube search... ...Google search
- Case Studies
- ...find outliers
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Defenses Against Adversarial Attacks
- Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang
______________________________________________________
Principal Component Analysis (PCA) Anomaly Detection
PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar