enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of datasets for machine-learning research - Wikipedia

    en.wikipedia.org/wiki/List_of_datasets_for...

    List of GitHub repositories of the project: Kubernetes SIGs This data is not pre-processed List of GitHub repositories of the project: Konveyor This data is not pre-processed List of GitHub repositories of the project: RedHat Marketplace This data is not pre-processed List of GitHub repositories of the project: Redhat blog This data is not pre ...

  3. Anomaly detection - Wikipedia

    en.wikipedia.org/wiki/Anomaly_detection

    ELKI is an open-source Java data mining toolkit that contains several anomaly detection algorithms, as well as index acceleration for them. PyOD is an open-source Python library developed specifically for anomaly detection. [56] scikit-learn is an open-source Python library that contains some algorithms for unsupervised anomaly detection.

  4. Zeek - Wikipedia

    en.wikipedia.org/wiki/Zeek

    Zeek analyzers perform application layer decoding, anomaly detection, signature matching and connection analysis. [13] Zeek's developers designed the software to incorporate additional analyzers. The latest method for creating new protocol analyzers relies on the Spicy framework.

  5. Deeplearning4j - Wikipedia

    en.wikipedia.org/wiki/Deeplearning4j

    Deeplearning4j relies on the widely used programming language Java, though it is compatible with Clojure and includes a Scala application programming interface (API). It is powered by its own open-source numerical computing library, ND4J, and works with both central processing units (CPUs) and graphics processing units (GPUs).

  6. Graph neural network - Wikipedia

    en.wikipedia.org/wiki/Graph_neural_network

    When viewed as a graph, a network of computers can be analyzed with GNNs for anomaly detection. Anomalies within provenance graphs often correlate to malicious activity within the network. GNNs have been used to identify these anomalies on individual nodes [ 51 ] and within paths [ 52 ] to detect malicious processes, or on the edge level [ 53 ...

  7. Recurrent neural network - Wikipedia

    en.wikipedia.org/wiki/Recurrent_neural_network

    Time series anomaly detection [125] Text-to-Video model [126] Rhythm learning [127] Music composition [128] Grammar learning [129] [58] [130] Handwriting recognition [131] [132] Human action recognition [133] Protein homology detection [134] Predicting subcellular localization of proteins [135] Several prediction tasks in the area of business ...

  8. List of artificial intelligence projects - Wikipedia

    en.wikipedia.org/wiki/List_of_artificial...

    Blue Brain Project, an attempt to create a synthetic brain by reverse-engineering the mammalian brain down to the molecular level. [1] Google Brain, a deep learning project part of Google X attempting to have intelligence similar or equal to human-level. [2] Human Brain Project, ten-year scientific research project, based on exascale ...

  9. Anomaly-based intrusion detection system - Wikipedia

    en.wikipedia.org/wiki/Anomaly-based_intrusion...

    Another method is to define what normal usage of the system comprises using a strict mathematical model, and flag any deviation from this as an attack. This is known as strict anomaly detection. [3] Other techniques used to detect anomalies include data mining methods, grammar based methods, and Artificial Immune System. [2]