Data-Efficient and Interpretable Tabular Anomaly Detection.
Chun-Hao ChangJinsung YoonSercan Ö. ArikMadeleine UdellTomas PfisterPublished in: CoRR (2022)
Keyphrases
- anomaly detection
- data sets
- machine learning
- network intrusion detection
- intrusion detection
- data analysis
- knowledge discovery
- data processing
- data points
- network traffic
- correlation analysis
- data mining techniques
- unsupervised learning
- intrusion detection system
- streaming data
- training data
- behavior analysis
- computer security
- detect anomalies
- network intrusion