Difference between revisions of "Cybersecurity"
| Line 20: | Line 20: | ||
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft] | * [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft] | ||
* [http://www.graphistry.com/ graphistry.com] | * [http://www.graphistry.com/ graphistry.com] | ||
| + | * [http://www.nextgov.com/topic/election-security Election Security | Nextgov] | ||
<youtube>cjo_u_yT2wQ</youtube> | <youtube>cjo_u_yT2wQ</youtube> | ||
Revision as of 07:38, 14 November 2018
- Case Studies
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Government Services
- Cybersecurity: Evaluating & Selling
- Capabilities
- Useful Models ...find outliers:
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- graphistry.com
- Election Security | Nextgov