Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
m
Line 11: Line 11:
 
* [[Cybersecurity: Evaluating & Selling]]  
 
* [[Cybersecurity: Evaluating & Selling]]  
 
* [[Capabilities]]  
 
* [[Capabilities]]  
* [[Radial Basis Function Network (RBFN)]]
+
* Useful Models:
 +
** [[Radial Basis Function Network (RBFN)]]
 +
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft]
 
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft]

Revision as of 10:59, 25 October 2018