Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection.
Olga PetrovaKarel DurkotaGalina AlperovichKarel HorákMichal NajmanBranislav BosanskýViliam LisýPublished in: CoRR (2020)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- detecting anomalies
- network traffic
- unsupervised anomaly detection
- intrusion detection system
- network intrusion detection
- multi agent
- computer security
- detecting anomalous
- network security
- behavior analysis
- malware detection
- one class support vector machines
- network anomaly detection
- connectionist systems
- data sets
- detect anomalies
- network intrusion
- normal behavior
- object recognition
- training data
- feature extraction
- data assimilation
- image segmentation