Difference between revisions of "Cybersecurity"
| Line 1: | Line 1: | ||
[http://www.youtube.com/results?search_query=cybersecurity+security+RSA+malware+detection+artificial+intelligence Youtube search...] | [http://www.youtube.com/results?search_query=cybersecurity+security+RSA+malware+detection+artificial+intelligence Youtube search...] | ||
| + | [http://www.google.com/search?q=cybersecurity+security+RSA+malware+detection+deep+machine+learning+ML ...Google search] | ||
* [[Case Studies]] | * [[Case Studies]] | ||
Revision as of 12:14, 3 January 2019
Youtube search... ...Google search
- Case Studies
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Government Services
- Cybersecurity: Evaluating & Selling
- Capabilities
- Useful Models ...find outliers:
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”