A comprehensive survey on graph anomaly detection with deep learning
Anomalies are rare observations (eg, data records or events) that deviate significantly from
the others in the sample. Over the past few decades, research on anomaly mining has …
the others in the sample. Over the past few decades, research on anomaly mining has …
[KNIHA][B] An introduction to outlier analysis
CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …
mining and statistics literature. In most applications, the data is created by one or more …
Robust anomaly detection for multivariate time series through stochastic recurrent neural network
Industry devices (ie, entities) such as server machines, spacecrafts, engines, etc., are
typically monitored with multivariate time series, whose anomaly detection is critical for an …
typically monitored with multivariate time series, whose anomaly detection is critical for an …
Holmes: real-time apt detection through correlation of suspicious information flows
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
Kairos: Practical intrusion detection and investigation using whole-system provenance
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …
execution. Recent studies have explored a variety of techniques to analyze provenance …
Generative adversarial active learning for unsupervised outlier detection
Outlier detection is an important topic in machine learning and has been used in a wide
range of applications. In this paper, we approach outlier detection as a binary-classification …
range of applications. In this paper, we approach outlier detection as a binary-classification …
Unicorn: Runtime provenance-based detector for advanced persistent threats
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks
Massive and dynamic networks arise in many practical applications such as social media,
security and public health. Given an evolutionary network, it is crucial to detect structural …
security and public health. Given an evolutionary network, it is crucial to detect structural …
Outlier detection using iterative adaptive mini-minimum spanning tree generation with applications on medical data
As an important technique for data pre-processing, outlier detection plays a crucial role in
various real applications and has gained substantial attention, especially in medical fields …
various real applications and has gained substantial attention, especially in medical fields …
Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise
F Liu, Y Wen, D Zhang, X Jiang, X **ng… - Proceedings of the 2019 …, 2019 - dl.acm.org
Conventional attacks of insider employees and emerging APT are both major threats for the
organizational information system. Existing detections mainly concentrate on users' behavior …
organizational information system. Existing detections mainly concentrate on users' behavior …