Applications of Signature Methods to Market Anomaly Detection.
Erdinc AkyildirimMatteo GambaraJosef TeichmannSyang ZhouPublished in: CoRR (2022)
Keyphrases
- anomaly detection
- intrusion detection
- neural network
- computer security
- one class support vector machines
- unsupervised anomaly detection
- data sets
- data mining
- network traffic
- behavior analysis
- tensor analysis
- anomaly based intrusion detection
- pattern recognition
- unsupervised learning
- intrusion detection system
- network intrusion detection