Difference between revisions of "Anomaly Detection"

From
Jump to: navigation, search
m
m
Line 27: Line 27:
 
**** [[Offense - Adversarial Threats/Attacks]]
 
**** [[Offense - Adversarial Threats/Attacks]]
 
**** [[Defenses Against Adversarial Attacks]]
 
**** [[Defenses Against Adversarial Attacks]]
* [[Government Services]]
+
* [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]]
** [[National Institute of Standards and Technology (NIST)]]
 
** [[U.S. Department of Homeland Security (DHS)]]
 
** [[Defense]]
 
 
* [[...find outliers]]
 
* [[...find outliers]]
* [[Capabilities]]  
+
* [[Immersive Reality]] ... [[Metaverse]] ... [[Digital Twin]] ... [[Internet of Things (IoT)]] ... [[Transhumanism]]
* [[Internet of Things (IoT)]]
 
* [[Screening; Passenger, Luggage, & Cargo]]
 
 
* [https://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang]
 
* [https://arxiv.org/abs/1906.03821 Time-Series Anomaly Detection Service at Microsoft | H. Ren, B. Xu, Y. Wang, C. Yi, C. Huang, X. Kou, T. Xing, M. Yang, J. Tong, and Q. Zhang]
  

Revision as of 20:53, 5 July 2023

YouTube ... Quora ...Google search ...Google News ...Bing News



Anomalies data points which do not conform to an expected pattern of the other items in the data set



Anomaly Detection. Sometimes the goal is to identify data points that are simply unusual. In fraud detection, for example, any highly unusual credit card spending patterns are suspect. The possible variations are so numerous and the training examples so few, that it's not feasible to learn what fraudulent activity looks like. The approach that anomaly detection takes is to simply learn what normal activity looks like (using a history non-fraudulent transactions) and identify anything that is significantly different.


Principal Component Analysis (PCA) Anomaly Detection

YouTube search...

PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar

ttk20130714602.gif