Completed
THREAT MODEL Use Cases
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Applying Machine Learning to User Behavior Anomaly Analysis
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 OUTLINE
- 3 USER BEHAVIOR ANALYTICS
- 4 MACHINE LEARNING
- 5 DATA SOURCES
- 6 DATA FORMATS
- 7 DATA NORMALIZATION: BEFORE
- 8 DATA NORMALIZATION: AFTER
- 9 ERP SECURITY LOGGING
- 10 THREAT MODEL Use Cases
- 11 ANOMALY TYPES
- 12 ANOMALIES VS. THREATS
- 13 STATIC ANOMALY DETECTION
- 14 CONTEXT BUILDING
- 15 CONTEXT THRESHOLD
- 16 CONTEXT MATCHING
- 17 ANOMALY ANALYSIS
- 18 TEMPORAL ANOMALY DETECTION
- 19 FEATURE ENGINEERING
- 20 FEATURE SELECTION
- 21 FEATURE ENCODING
- 22 MODEL IMPLEMENTATION
- 23 MODEL MEMORY
- 24 MODEL DESIGN Architecture
- 25 MODEL PARAMETERS
- 26 SEQUENCE LENGTH
- 27 KNOWLEDGE BASE SORTING
- 28 ADAPTIVE THRESHOLD
- 29 CONCLUSIONS