Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
m
Line 20: Line 20:
 
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft]
 
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft]
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.graphistry.com/ graphistry.com]
 
+
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
 +
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
  
 
<youtube>cjo_u_yT2wQ</youtube>
 
<youtube>cjo_u_yT2wQ</youtube>

Revision as of 17:10, 19 December 2018