1 code implementation • 27 Dec 2020 • Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu
Autoencoder-based anomaly detection methods have been used in identifying anomalous users from large-scale enterprise logs with the assumption that adversarial activities do not follow past habitual patterns.