all InfoSec news
A Revealing Large-Scale Evaluation of Unsupervised Anomaly Detection Algorithms. (arXiv:2204.09825v1 [cs.LG])
April 22, 2022, 1:20 a.m. | Maxime Alvarez, Jean-Charles Verdier, D'Jeff K. Nkashama, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza
cs.CR updates on arXiv.org arxiv.org
Anomaly detection has many applications ranging from bank-fraud detection and
cyber-threat detection to equipment maintenance and health monitoring. However,
choosing a suitable algorithm for a given application remains a challenging
design decision, often informed by the literature on anomaly detection
algorithms. We extensively reviewed twelve of the most popular unsupervised
anomaly detection methods. We observed that, so far, they have been compared
using inconsistent protocols - the choice of the class of interest or the
positive class, the split of …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Engineer, Incident Response
@ Databricks | Remote - Netherlands
Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)
@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC
Data Security Architect
@ Accenture Federal Services | Washington, DC
Identity Security Administrator
@ SailPoint | Pune, India