Difference between revisions of "Cybersecurity"
m |
m |
||
| Line 5: | Line 5: | ||
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | ||
}} | }} | ||
| − | [http://www.youtube.com/results?search_query=cybersecurity+security+RSA+malware+detection+artificial+intelligence Youtube search...] | + | [http://www.youtube.com/results?search_query=cybersecurity+security+RSA+malware+detection+artificial+intelligence+ai Youtube search...] |
| − | [http://www.google.com/search?q=cybersecurity+security+RSA+malware+detection+deep+machine+learning+ML ...Google search] | + | [http://www.google.com/search?q=cybersecurity+security+RSA+malware+detection+deep+machine+learning+ML+ai ...Google search] |
* [[Case Studies]] | * [[Case Studies]] | ||
| Line 12: | Line 12: | ||
*** [[Screening; Passenger, Luggage, & Cargo]] | *** [[Screening; Passenger, Luggage, & Cargo]] | ||
** [[Government Services]] | ** [[Government Services]] | ||
| + | ** [[Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)]] | ||
** [[Defense]] | ** [[Defense]] | ||
| + | *** [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration|Cybersecurity & Acquisition Lifecycle Integration]] | ||
* [[Capabilities]] | * [[Capabilities]] | ||
* [[Cybersecurity References]] | * [[Cybersecurity References]] | ||
| Line 19: | Line 21: | ||
** [http://aka.ms/MCRA-MVA Cybersecurity Reference Architecture] | [[Microsoft]] | ** [http://aka.ms/MCRA-MVA Cybersecurity Reference Architecture] | [[Microsoft]] | ||
* [[Cybersecurity Companies/Products]] | * [[Cybersecurity Companies/Products]] | ||
| − | |||
| − | |||
* [[Cybersecurity: Evaluating & Selling]] | * [[Cybersecurity: Evaluating & Selling]] | ||
* [[(Artificial) Immune System]] | * [[(Artificial) Immune System]] | ||
* [[Telecommunications#5G Security|5G Security]] | * [[Telecommunications#5G Security|5G Security]] | ||
| + | * [[Algorithm Administration#AIOps / MLOps|AIOps / MLOps]] | ||
* [[Gaming#Cybersecurity - Gaming|Cybersecurity - Gaming]] | * [[Gaming#Cybersecurity - Gaming|Cybersecurity - Gaming]] | ||
* Useful Models [[...find outliers]]: | * Useful Models [[...find outliers]]: | ||
Revision as of 14:25, 6 October 2020
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: Evaluating & Selling
- (Artificial) Immune System
- 5G Security
- AIOps / MLOps
- Cybersecurity - Gaming
- Useful Models ...find outliers:
- Detecting Malicious Requests with Keras & TensorFlow | Adam Kusey - Medium
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
- Breaking Down the Tencent 2018 Cybersecurity Report
- Chronicle combines all the best parts of Google and X culture
- Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind
- The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture
- Watch me Build a Cybersecurity Startup | Siraj Raval
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia
|
|
|
|
Data Center Security
|
|
|
|
|
|