Difference between revisions of "Anomaly Detection"
m |
|||
| Line 20: | Line 20: | ||
______________________________________________________ | ______________________________________________________ | ||
| + | <youtube>LRqX5uO5StA</youtube> | ||
<youtube>F7xgxrPpkkU</youtube> | <youtube>F7xgxrPpkkU</youtube> | ||
<youtube>12Xq9OLdQwQ</youtube> | <youtube>12Xq9OLdQwQ</youtube> | ||
| Line 28: | Line 29: | ||
<youtube>yZ-Y1WCM0lc</youtube> | <youtube>yZ-Y1WCM0lc</youtube> | ||
<youtube>fRklX97iGIw</youtube> | <youtube>fRklX97iGIw</youtube> | ||
| + | <youtube>5vrY4RbeWkM</youtube> | ||
| + | <youtube>3swnsoydKTI</youtube> | ||
== [[Principal Component Analysis (PCA)]] Anomaly Detection == | == [[Principal Component Analysis (PCA)]] Anomaly Detection == | ||
Revision as of 20:00, 7 September 2020
Youtube search... ...Google search
- Case Studies
- ...find outliers
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Defenses Against Adversarial Attacks
- Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang
______________________________________________________
Principal Component Analysis (PCA) Anomaly Detection
PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar