April 22, 2022, 1:20 a.m. | Maxime Alvarez, Jean-Charles Verdier, D'Jeff K. Nkashama, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza

cs.CR updates on arXiv.org arxiv.org

Anomaly detection has many applications ranging from bank-fraud detection and
cyber-threat detection to equipment maintenance and health monitoring. However,
choosing a suitable algorithm for a given application remains a challenging
design decision, often informed by the literature on anomaly detection
algorithms. We extensively reviewed twelve of the most popular unsupervised
anomaly detection methods. We observed that, so far, they have been compared
using inconsistent protocols - the choice of the class of interest or the
positive class, the split of …

algorithms anomaly detection detection large lg scale

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Engineer, Incident Response

@ Databricks | Remote - Netherlands

Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)

@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC

Data Security Architect

@ Accenture Federal Services | Washington, DC

Identity Security Administrator

@ SailPoint | Pune, India