Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 19: Line 19:
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft]
+
 
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
 
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
Line 25: Line 25:
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
  
<youtube>PpiO0S-OQS0</youtube>
+
 
 
<youtube>cjo_u_yT2wQ</youtube>
 
<youtube>cjo_u_yT2wQ</youtube>
 
<youtube>YiUN35Ikdfw</youtube>
 
<youtube>YiUN35Ikdfw</youtube>
 
<youtube>5c6AADI7Pb4</youtube>
 
<youtube>5c6AADI7Pb4</youtube>
<youtube>JNAu-wn3y0k</youtube>
 
 
<youtube>SiAgnyUc-70</youtube>
 
<youtube>SiAgnyUc-70</youtube>
 
<youtube>zGBJ7iH0xOw</youtube>
 
<youtube>zGBJ7iH0xOw</youtube>
Line 41: Line 40:
 
<youtube>B3ZZWx9WUEk</youtube>
 
<youtube>B3ZZWx9WUEk</youtube>
 
<youtube>gCWBFyFTxVU</youtube>
 
<youtube>gCWBFyFTxVU</youtube>
 +
 +
== Fraud Detection ==
 +
* [http://www.kdnuggets.com/2018/08/introduction-fraud-detection-systems.html Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft]
 +
* [http://emerj.com/ai-sector-overviews/ai-for-health-insurance-fraud-detection-current-applications/?utm_term=43496&utm_medium=ai-for-health-insurance-fraud-detection-current-applications%2F&utm_campaign=broadcast&utm_source=email&utm_content=&_ke=eyJrbF9lbWFpbCI6ICJicGVhdEBlcHJvY2Vzc3NvbHV0aW9ucy5jb20iLCAia2xfY29tcGFueV9pZCI6ICJNanhacWcifQ%3D%3D AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia]
 +
 +
<youtube>PpiO0S-OQS0</youtube>
 +
<youtube>JNAu-wn3y0k</youtube>

Revision as of 20:07, 31 January 2019