Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 24: Line 24:
 
** [[Radial Basis Function Network (RBFN)]]
 
** [[Radial Basis Function Network (RBFN)]]
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 +
* [http://medium.com/slalom-engineering/detecting-malicious-requests-with-keras-tensorflow-5d5db06b4f28 Detecting Malicious Requests with Keras & TensorFlow | Adam Kusey - Medium]
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.graphistry.com/ graphistry.com]

Revision as of 08:47, 7 April 2019

Youtube search... ...Google search


Fraud Detection