mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.1K
active users

#anomalydetection

0 posts0 participants0 posts today
Pyrzout :vm:<p>SophosAI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job – Source: news.sophos.com <a href="https://ciso2ciso.com/sophosai-at-black-hat-usa-25-anomaly-detection-betrayed-us-so-we-gave-it-a-new-job-source-news-sophos-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/sophosai-at-blac</span><span class="invisible">k-hat-usa-25-anomaly-detection-betrayed-us-so-we-gave-it-a-new-job-source-news-sophos-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/anomalydetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anomalydetection</span></a> <a href="https://social.skynetcloud.site/tags/ThreatResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatResearch</span></a> <a href="https://social.skynetcloud.site/tags/nakedsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakedsecurity</span></a> <a href="https://social.skynetcloud.site/tags/nakedsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakedsecurity</span></a> <a href="https://social.skynetcloud.site/tags/blackhat2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackhat2025</span></a> <a href="https://social.skynetcloud.site/tags/SophosXOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SophosXOps</span></a> <a href="https://social.skynetcloud.site/tags/FEATURED" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FEATURED</span></a> <a href="https://social.skynetcloud.site/tags/SophosAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SophosAI</span></a> <a href="https://social.skynetcloud.site/tags/featured" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>featured</span></a> <a href="https://social.skynetcloud.site/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a></p>
LLMsHow LLMs Are Transforming Anomaly Detection (With Real Examples) 7 Emerging Patterns Every Practitioner Should Know Continue reading on Medium » <br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/llm" target="_blank">#llm</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ai" target="_blank">#ai</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/llm-agent" target="_blank">#llm-agent</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/machine-learning" target="_blank">#machine-learning</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/anomaly-detection" target="_blank">#anomaly-detection</a><br><br><a href="https://shuaiguo.medium.com/how-llms-are-transforming-anomaly-detection-with-real-examples-c3f5ee5503cf?source=rss------machine_learning-5" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=LLMs" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=8y6gAmR4PjRAGJ0X2GsiHXLvRGC&amp;interestId=LLMs" rel="nofollow noopener" target="_blank">Match</a>
2rZiKKbOU3nTafniR2qMMSE0gwZAnomaly Detection in Sequential Data using LSTM Autoencoder and KMeans Clustering (unsupervised) Anomaly detection in time series data is a critical task in many fields such as finance, cybersecuri...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/anomaly-detection" target="_blank">#anomaly-detection</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/time-series-analysis" target="_blank">#time-series-analysis</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/machine-learning" target="_blank">#machine-learning</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/k-means" target="_blank">#k-means</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/sequential-data" target="_blank">#sequential-data</a><br><br><a href="https://medium.com/@falonnekpamegan/anomaly-detection-in-sequential-data-using-lstm-autoencoder-and-kmeans-clustering-unsupervised-6c6f27149358?source=rss------machine_learning-5" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=VQ3qRom3sge4NWfI2237Q4mec8u&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Akash Joseph<p>Smart Home Security: AI-Driven Protection for Safer Living</p><p><a href="https://rackenzik.com/smart-home-security-ai-driven-protection-for-safer-living/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rackenzik.com/smart-home-secur</span><span class="invisible">ity-ai-driven-protection-for-safer-living/</span></a></p><p><a href="https://mastodon.social/tags/SmartHome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartHome</span></a> <a href="https://mastodon.social/tags/HomeAutomation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeAutomation</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/HomeSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeSecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/PrivacyMatters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyMatters</span></a> <a href="https://mastodon.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://mastodon.social/tags/SmartDevices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartDevices</span></a> <a href="https://mastodon.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://mastodon.social/tags/FaceRecognition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FaceRecognition</span></a> <a href="https://mastodon.social/tags/DigitalSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSecurity</span></a> <a href="https://mastodon.social/tags/TechSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSafety</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZAnomaly Detection Using Autoencoders: A Deep Dive into Fraud Detection Anomaly detection is an es...<br><br><a href="https://medium.com/@stacymacbrains/anomaly-detection-using-autoencoders-a-deep-dive-into-fraud-detection-9f59bcb5ab32?source=rss------machine_learning-5" rel="nofollow noopener" target="_blank">https://medium.com/@stacymacbrains/anomaly-detection-using-autoencoders-a-deep-dive-into-fraud-detection-9f59bcb5ab32?source=rss------machine_learning-5</a><br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/deep-learning" target="_blank">#deep-learning</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/anomaly-detection" target="_blank">#anomaly-detection</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/autoencoder" target="_blank">#autoencoder</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/machine-learning" target="_blank">#machine-learning</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a><br><br><a href="https://awakari.com/pub-msg.html?id=POL6mXgRn6bTnvUEOZ4PXuPSOXo&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Result Details</a>
Tedi Heriyanto<p>Using ELK Stack for Anomaly Detection with Machine Learning Libraries: <a href="https://blog.poespas.me/posts/2025/03/05/elk-stack-anomaly-detection-machine-learning/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.poespas.me/posts/2025/03/</span><span class="invisible">05/elk-stack-anomaly-detection-machine-learning/</span></a></p><p><a href="https://infosec.exchange/tags/elk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elk</span></a> <a href="https://infosec.exchange/tags/anomalydetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anomalydetection</span></a> <a href="https://infosec.exchange/tags/machinelearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>machinelearning</span></a></p>
Bytes Europe<p>Integrating AI and ML technologies across OT, ICS environments to enhance anomaly detection and operational resilience <a href="https://www.byteseu.com/938379/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/938379/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://pubeurope.com/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://pubeurope.com/tags/Armis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Armis</span></a> <a href="https://pubeurope.com/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://pubeurope.com/tags/ControlSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ControlSystem</span></a> <a href="https://pubeurope.com/tags/Darktrace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darktrace</span></a> <a href="https://pubeurope.com/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenerativeAI</span></a> <a href="https://pubeurope.com/tags/ics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ics</span></a> <a href="https://pubeurope.com/tags/industrial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrial</span></a> <a href="https://pubeurope.com/tags/IndustrialControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndustrialControl</span></a> <a href="https://pubeurope.com/tags/ML" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ML</span></a> <a href="https://pubeurope.com/tags/Nvidia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nvidia</span></a> <a href="https://pubeurope.com/tags/OperationalResilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalResilience</span></a> <a href="https://pubeurope.com/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://pubeurope.com/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://pubeurope.com/tags/ThreatGEN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatGEN</span></a></p>
Worlddefensereport<p>Lockheed Martin Skunk Works, Arquimea Test AI-Powered Anomaly Detection for ISR Missions </p><p><a href="https://defensemirror.com/news/39292/Lockheed_Martin_Skunk_Works__Arquimea_Test_AI_Powered_Anomaly_Detection_for_ISR_Missions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">defensemirror.com/news/39292/L</span><span class="invisible">ockheed_Martin_Skunk_Works__Arquimea_Test_AI_Powered_Anomaly_Detection_for_ISR_Missions</span></a></p><p><a href="https://mstdn.social/tags/LockheedMartin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockheedMartin</span></a> <a href="https://mstdn.social/tags/SkunkWorks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SkunkWorks</span></a> <a href="https://mstdn.social/tags/Arquimea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arquimea</span></a> <a href="https://mstdn.social/tags/ISR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISR</span></a> <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mstdn.social/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachineLearning</span></a> <a href="https://mstdn.social/tags/DefenseTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DefenseTech</span></a> <a href="https://mstdn.social/tags/Drones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drones</span></a> <a href="https://mstdn.social/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> <a href="https://mstdn.social/tags/UAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UAS</span></a> <a href="https://mstdn.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://mstdn.social/tags/Infrared" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infrared</span></a> <a href="https://mstdn.social/tags/ElectroOptical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ElectroOptical</span></a></p>
defensedaily<p>Lockheed Martin Skunk Works, Arquimea Test AI-Powered Anomaly Detection for ISR Missions </p><p><a href="https://defensemirror.com/news/39292/Lockheed_Martin_Skunk_Works__Arquimea_Test_AI_Powered_Anomaly_Detection_for_ISR_Missions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">defensemirror.com/news/39292/L</span><span class="invisible">ockheed_Martin_Skunk_Works__Arquimea_Test_AI_Powered_Anomaly_Detection_for_ISR_Missions</span></a></p><p><a href="https://mstdn.social/tags/LockheedMartin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LockheedMartin</span></a> <a href="https://mstdn.social/tags/SkunkWorks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SkunkWorks</span></a> <a href="https://mstdn.social/tags/Arquimea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arquimea</span></a> <a href="https://mstdn.social/tags/ISR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISR</span></a> <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mstdn.social/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachineLearning</span></a> <a href="https://mstdn.social/tags/DefenseTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DefenseTech</span></a> <a href="https://mstdn.social/tags/Drones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drones</span></a> <a href="https://mstdn.social/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> <a href="https://mstdn.social/tags/UAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UAS</span></a> <a href="https://mstdn.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://mstdn.social/tags/Infrared" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infrared</span></a> <a href="https://mstdn.social/tags/ElectroOptical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ElectroOptical</span></a></p>
Tycoon World<p>AI in Banking Security: Revolution &amp; Risks</p><p><a href="https://mastodon.social/tags/TycoonWorld" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TycoonWorld</span></a> <a href="https://mastodon.social/tags/AIinBanking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIinBanking</span></a> <a href="https://mastodon.social/tags/BankingSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BankingSecurity</span></a> <a href="https://mastodon.social/tags/CyberSecurityAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAI</span></a> <a href="https://mastodon.social/tags/FinTechSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinTechSecurity</span></a> <a href="https://mastodon.social/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://mastodon.social/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachineLearning</span></a> <a href="https://mastodon.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://mastodon.social/tags/BehavioralAnalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BehavioralAnalytics</span></a> <a href="https://mastodon.social/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://mastodon.social/tags/FraudPrevention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FraudPrevention</span></a> <a href="https://mastodon.social/tags/PredictiveAnalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PredictiveAnalytics</span></a> <a href="https://mastodon.social/tags/EthicalAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalAI</span></a> <a href="https://mastodon.social/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> <a href="https://mastodon.social/tags/ExplainableAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExplainableAI</span></a> <a href="https://mastodon.social/tags/AdversarialAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdversarialAttacks</span></a> <a href="https://mastodon.social/tags/BankingInnovation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BankingInnovation</span></a> <a href="https://mastodon.social/tags/FinancialSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinancialSecurity</span></a> <a href="https://mastodon.social/tags/AIethics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIethics</span></a> <a href="https://mastodon.social/tags/AIrisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIrisks</span></a> <a href="https://mastodon.social/tags/DigitalBanking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalBanking</span></a> <a href="https://mastodon.social/tags/AIinFinance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIinFinance</span></a> <a href="https://mastodon.social/tags/AIandCybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIandCybercrime</span></a> <a href="https://mastodon.social/tags/SmartBanking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartBanking</span></a> <a href="https://mastodon.social/tags/FinTechTrends" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinTechTrends</span></a> <a href="https://mastodon.social/tags/CyberRiskMitigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRiskMitigation</span></a></p><p><a href="https://tycoonworld.in/ai-in-banking-security-revolution-risks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tycoonworld.in/ai-in-banking-s</span><span class="invisible">ecurity-revolution-risks/</span></a></p>
VictoriaMetrics<p>Whether you're tackling anomaly detection, or looking for a reliable hosted monitoring solution, VictoriaMetrics has you covered.</p><p>Take advantage of this opportunity to learn from our team and see live demos of our latest innovations.<br>See you tomorrow in <a href="https://mastodon.social/tags/London" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>London</span></a> - Booth <a href="https://mastodon.social/tags/N503" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>N503</span></a>!</p><p><a href="https://mastodon.social/tags/CNCF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CNCF</span></a> <a href="https://mastodon.social/tags/CloudNativeCon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudNativeCon</span></a> <a href="https://mastodon.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://mastodon.social/tags/timeseries" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>timeseries</span></a> </p><p><a href="https://kutt.it/VhaHN7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">kutt.it/VhaHN7</span><span class="invisible"></span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZAnomaly Detection in Data Pipelines: Strengthening Security with Machine Learning Data pipelines ...<br><br><a href="https://medium.com/@erickbautistadeza/anomaly-detection-in-data-pipelines-strengthening-security-with-machine-learning-402678aa3408?source=rss------machine_learning-5" rel="nofollow noopener" target="_blank">https://medium.com/@erickbautistadeza/anomaly-detection-in-data-pipelines-strengthening-security-with-machine-learning-402678aa3408?source=rss------machine_learning-5</a><br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/data-pipeline" target="_blank">#data-pipeline</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/anomaly-detection" target="_blank">#anomaly-detection</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/data-security" target="_blank">#data-security</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/machine-learning" target="_blank">#machine-learning</a><br><br><a href="https://awakari.com/pub-msg.html?id=U1DFLqve3042V4uElGL620RC7jk" rel="nofollow noopener" target="_blank">Event Attributes</a>
Marco Pegoraro<p>3/4</p><p>New paper in Knowledge-Based Systems: in "Control-flow <a href="https://mastodon.acm.org/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> by process mining-based feature extraction and dimensionality reduction" we combine <a href="https://mastodon.acm.org/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachineLearning</span></a> and <a href="https://mastodon.acm.org/tags/ProcessMining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProcessMining</span></a> to detect anomalies in logs.</p><p>Work led by Francesco Vitale, and with Wil van der Aalst and Nicola Mazzocca. Fruit of the alliance between Università degli Studi di Napoli Federico II and RWTH Aachen University.</p><p>Out now: <a href="https://doi.org/10.1016/j.knosys.2025.112970" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doi.org/10.1016/j.knosys.2025.</span><span class="invisible">112970</span></a><br>Eprint available: <a href="https://arxiv.org/abs/2502.10211" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2502.10211</span><span class="invisible"></span></a></p>
PyCharm Blog<p>Anomaly Detection in Time Series<br><a href="https://techhub.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://techhub.social/tags/Pycharm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pycharm</span></a> <a href="https://techhub.social/tags/Datascience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datascience</span></a> <a href="https://techhub.social/tags/Howtos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Howtos</span></a> <a href="https://techhub.social/tags/Anomalydetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anomalydetection</span></a></p><p><a href="https://blog.jetbrains.com/pycharm/2025/01/anomaly-detection-in-time-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.jetbrains.com/pycharm/202</span><span class="invisible">5/01/anomaly-detection-in-time-series/</span></a></p>
PyCharm Blog<p>Anomaly Detection in Machine Learning Using Python<br><a href="https://techhub.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://techhub.social/tags/Pycharm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pycharm</span></a> <a href="https://techhub.social/tags/Datascience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datascience</span></a> <a href="https://techhub.social/tags/Howtos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Howtos</span></a> <a href="https://techhub.social/tags/Anomalydetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anomalydetection</span></a></p><p><a href="https://blog.jetbrains.com/pycharm/2025/01/anomaly-detection-in-machine-learning/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.jetbrains.com/pycharm/202</span><span class="invisible">5/01/anomaly-detection-in-machine-learning/</span></a></p>
Towards Data Science<p>Shared Nearest Neighbors (SNN) — A distance metric that can improve prediction, clustering, and outlier detection in datasets with many dimensions and with varying densities. Read more from W Brett Kennedy now!</p><p><a href="https://me.dm/tags/Clustering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Clustering</span></a> <a href="https://me.dm/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> </p><p><a href="https://towardsdatascience.com/shared-nearest-neighbors-a-more-robust-distance-metric-064d7f99ffb7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">towardsdatascience.com/shared-</span><span class="invisible">nearest-neighbors-a-more-robust-distance-metric-064d7f99ffb7</span></a></p>
Marko Jahnke<p>It is not surprising that <a href="https://bonn.social/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a> detection rules can be evaded in many cases, this is the same as for signature-based detection of <a href="https://bonn.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> in general.</p><p>This approach uses a combination of misuse and <a href="https://bonn.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> to find potential <a href="https://bonn.social/tags/evation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evation</span></a> attempts. The PoC implementation is called <a href="https://bonn.social/tags/AMIDES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMIDES</span></a>, and the code is available on GitHub.</p><p><a href="https://www.usenix.org/conference/usenixsecurity24/presentation/uetz" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/conference/usenixse</span><span class="invisible">curity24/presentation/uetz</span></a></p><p><a href="https://bonn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://bonn.social/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a></p>
VictoriaMetrics<p>🚀 We're just one day away from <a href="https://mastodon.social/tags/KubeCon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KubeCon</span></a> North America. <br>VictoriaMetrics is bringing our cutting-edge <a href="https://mastodon.social/tags/observability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>observability</span></a> solutions to the event, and we're excited to showcase what makes our high-performance, <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> time series database &amp; log database stand out. Whether you're tackling anomaly detection, root cause analysis, or looking for a reliable hosted monitoring solution, VictoriaMetrics has you covered.</p><p><a href="https://mastodon.social/tags/TimeSeriesDatabase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TimeSeriesDatabase</span></a> <a href="https://mastodon.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> <a href="https://mastodon.social/tags/Monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Monitoring</span></a> <a href="https://mastodon.social/tags/CloudNativeCon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudNativeCon</span></a></p>
Graylog<p>Let's have a chat about NIST 800-53! 👍 Once we understand how NIST 800-53 fits into a compliance program, we can build the <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> controls and monitoring that help achieve our security and business objectives.🔒☑️ 🙌 </p><p>The most recent revision to the National Institute of Standards and Technology (<a href="https://infosec.exchange/tags/NIST" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIST</span></a>) Cybersecurity Framework (CSF) provides the overview roadmap for your compliance journey. And the NIST 800-53 sets out a series of controls that organizations can use to meet compliance requirements.</p><p>Learn more about:<br>✔️ The 20 control families<br>✔️ What NIST 800-53 compliance looks like<br>✔️ Continuous monitoring for NIST compliance</p><p><a href="https://graylog.org/post/what-is-nist-800-53/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">graylog.org/post/what-is-nist-</span><span class="invisible">800-53/</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliance</span></a> <a href="https://infosec.exchange/tags/alertfatigue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>alertfatigue</span></a> <a href="https://infosec.exchange/tags/anomalydetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anomalydetection</span></a></p>
Tao of Mac<p>KQL</p><p>Kusto Query Language (KQL) is a powerful query language that is used to query Azure Data Explorer (ADX) and Azure Monitor log data. KQL is used to query data in tables, summarize d(...)</p><p><a href="https://botsin.space/tags/adx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adx</span></a> <a href="https://botsin.space/tags/anomalydetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anomalydetection</span></a> <a href="https://botsin.space/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a> <a href="https://botsin.space/tags/kql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kql</span></a> <a href="https://botsin.space/tags/kusto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kusto</span></a></p><p><a href="https://taoofmac.com/space/dev/kql" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">taoofmac.com/space/dev/kql</span><span class="invisible"></span></a></p>