Difference between revisions of "Cybersecurity"
| Line 12: | Line 12: | ||
* [[Capabilities]] | * [[Capabilities]] | ||
* Useful Models: | * Useful Models: | ||
| + | **[[One-class Support Vector Machine (SVM)]] | ||
| + | ** [[Variational Autoencoder (VAE)]] | ||
| + | ** [[Autoencoder (AE) / Encoder-Decoder]] | ||
** [[Radial Basis Function Network (RBFN)]] | ** [[Radial Basis Function Network (RBFN)]] | ||
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]] | ** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]] | ||
Revision as of 19:12, 25 October 2018
- Case Studies
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Government Services
- Cybersecurity: Evaluating & Selling
- Capabilities
- Useful Models:
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- graphistry.com