Sleuthing for adverse outcomes: Using anomaly detection to identify unusual behaviors of third-party agents.
Michelle R. MillerRobert CezeauxPublished in: ADF@KDD (2017)
Keyphrases
- anomaly detection
- third party
- behavior analysis
- intrusion detection
- multi agent
- detect anomalies
- detecting anomalies
- network intrusion detection
- unsupervised anomaly detection
- anomalous behavior
- intrusion detection system
- network traffic
- sensitive information
- computer security
- reverse logistics
- personal information
- network anomaly detection
- network security
- unsupervised learning
- detecting anomalous
- one class support vector machines
- cumulative sum
- knowledge discovery
- negative selection algorithm
- computer vision
- pattern recognition
- network intrusion
- feature space
- agent based simulation
- human behavior
- maximum entropy