Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
m
m
Line 34: Line 34:
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 
* [http://medium.com/syncedreview/breaking-down-the-tencent-2018-cybersecurity-report-26b3befde3f4 Breaking Down the Tencent 2018 Cybersecurity Report]
 
* [http://medium.com/syncedreview/breaking-down-the-tencent-2018-cybersecurity-report-26b3befde3f4 Breaking Down the Tencent 2018 Cybersecurity Report]
* [http://chronicle.security/  Chronicle]  combines all the best parts of Google and X culture
+
* [http://chronicle.security/  Chronicle]  combines all the best parts of [[Google]] and X culture
 
* [http://pathmind.com/wiki/fraud-detection Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind]
 
* [http://pathmind.com/wiki/fraud-detection Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind]
 
* [http://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_CSET_S508C.pdf The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center] ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture
 
* [http://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_CSET_S508C.pdf The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center] ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture

Revision as of 21:16, 7 September 2020

Youtube search... ...Google search

Fraud Detection

Data Center Security