Difference between revisions of "Cybersecurity"
| Line 39: | Line 39: | ||
<youtube>R9lkyJL2LlQ</youtube> | <youtube>R9lkyJL2LlQ</youtube> | ||
<youtube>B3ZZWx9WUEk</youtube> | <youtube>B3ZZWx9WUEk</youtube> | ||
| − | <youtube> | + | <youtube>hx1vlorz1w4</youtube> |
== Fraud Detection == | == Fraud Detection == | ||
| Line 47: | Line 47: | ||
<youtube>PpiO0S-OQS0</youtube> | <youtube>PpiO0S-OQS0</youtube> | ||
<youtube>JNAu-wn3y0k</youtube> | <youtube>JNAu-wn3y0k</youtube> | ||
| + | <youtube>gCWBFyFTxVU</youtube> | ||
| + | <youtube>m7htZ7PWQE8</youtube> | ||
Revision as of 04:21, 1 February 2019
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Government Services
- Cybersecurity: Evaluating & Selling
- Useful Models ...find outliers:
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia