Using A Personalized Anomaly Detection Approach with Machine Learning to Detect Stolen Phones.
Huizhong HuPhilip K. ChanPublished in: FLAIRS Conference (2018)
Keyphrases
- anomaly detection
- machine learning
- detect anomalies
- detecting anomalous
- intrusion detection
- network anomaly detection
- malware detection
- normal behavior
- anomalous behavior
- detecting anomalies
- unsupervised learning
- network traffic
- data mining
- misuse detection
- unsupervised anomaly detection
- pattern recognition
- computer security
- one class support vector machines
- network intrusion detection
- intrusion detection system
- behavior analysis
- mobile phone
- network security
- computer vision
- e learning
- knowledge discovery
- computational intelligence
- normal traffic
- learning algorithm
- network intrusion
- model selection
- decision trees
- neural network
- feature selection
- detection algorithm
- text mining
- pairwise
- natural language processing
- support vector machine