Difference between revisions of "Anomaly Detection"
Line 1: | Line 1: | ||
+ | {{#seo: | ||
+ | |title=PRIMO.ai | ||
+ | |titlemode=append | ||
+ | |keywords=artificial, intelligence, machine, learning, models, algorithms, data, singularity, moonshot, Tensorflow, Google, Nvidia, Microsoft, Azure, Amazon, AWS | ||
+ | |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | ||
+ | }} | ||
[http://www.youtube.com/results?search_query=cyber+security+anomaly+detection+defense+ai+artificial+intelligence Youtube search...] | [http://www.youtube.com/results?search_query=cyber+security+anomaly+detection+defense+ai+artificial+intelligence Youtube search...] | ||
+ | [http://www.google.com/search?q=cyber+security+anomaly+detection+defense+ai+deep+machine+learning+ML+artificial+intelligence ...Google search] | ||
* [[Cybersecurity]] | * [[Cybersecurity]] |
Revision as of 13:45, 2 February 2019
Youtube search... ...Google search
- Cybersecurity
- ...find outliers
- Government Services
- Capabilities
- Defenses Against Adversarial Examples for Deep Neural Networks
______________________________________________________
Principal Component Analysis (PCA) Anomaly Detection
PCA-based anomaly detection - the vast majority of the data falls into a stereotypical distribution; points deviating dramatically from that distribution are suspect Keep it Simple : Machine Learning & Algorithms for Big Boys | Dinesh Chandrasekar