no code implementations • 9 May 2018 • Benjamin J. Radford, Bartley D. Richardson, Shawn E. Davis
We evaluate methods for applying unsupervised anomaly detection to cybersecurity applications on computer network traffic data, or flow.
Unsupervised Anomaly Detection