Difference between revisions of "Cybersecurity"
m |
m |
||
| Line 42: | Line 42: | ||
* [[Watch me Build a Cybersecurity Startup]] | [[Creatives#Siraj Raval|Siraj Raval]] | * [[Watch me Build a Cybersecurity Startup]] | [[Creatives#Siraj Raval|Siraj Raval]] | ||
| + | |||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>u-EQHbqWY60</youtube> | <youtube>u-EQHbqWY60</youtube> | ||
| + | <b>HH1 | ||
| + | </b><br>BB1 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>cjo_u_yT2wQ</youtube> | <youtube>cjo_u_yT2wQ</youtube> | ||
| + | <b>HH2 | ||
| + | </b><br>BB2 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>YiUN35Ikdfw</youtube> | <youtube>YiUN35Ikdfw</youtube> | ||
| + | <b>HH3 | ||
| + | </b><br>BB3 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>5c6AADI7Pb4</youtube> | <youtube>5c6AADI7Pb4</youtube> | ||
| + | <b>HH4 | ||
| + | </b><br>BB4 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>SiAgnyUc-70</youtube> | <youtube>SiAgnyUc-70</youtube> | ||
| + | <b>HH5 | ||
| + | </b><br>BB5 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>zGBJ7iH0xOw</youtube> | <youtube>zGBJ7iH0xOw</youtube> | ||
| + | <b>HH6 | ||
| + | </b><br>BB6 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>ojTz7bOjT6o</youtube> | <youtube>ojTz7bOjT6o</youtube> | ||
| + | <b>HH7 | ||
| + | </b><br>BB7 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>WFrj3sdcOIU</youtube> | <youtube>WFrj3sdcOIU</youtube> | ||
| + | <b>HH8 | ||
| + | </b><br>BB8 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>ca-C3voZwpM</youtube> | <youtube>ca-C3voZwpM</youtube> | ||
| + | <b>HH9 | ||
| + | </b><br>BB9 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>7RQH8oECSyg</youtube> | <youtube>7RQH8oECSyg</youtube> | ||
| + | <b>HH10 | ||
| + | </b><br>BB10 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>SdEPqFCC13U</youtube> | <youtube>SdEPqFCC13U</youtube> | ||
| + | <b>HH1 | ||
| + | </b><br>BB1 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>t1Swvz2dpUQ</youtube> | <youtube>t1Swvz2dpUQ</youtube> | ||
| + | <b>HH2 | ||
| + | </b><br>BB2 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>R9lkyJL2LlQ</youtube> | <youtube>R9lkyJL2LlQ</youtube> | ||
| + | <b>HH3 | ||
| + | </b><br>BB3 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>B3ZZWx9WUEk</youtube> | <youtube>B3ZZWx9WUEk</youtube> | ||
| + | <b>HH4 | ||
| + | </b><br>BB4 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>hx1vlorz1w4</youtube> | <youtube>hx1vlorz1w4</youtube> | ||
| + | <b>HH5 | ||
| + | </b><br>BB5 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>99hniQYB6VM</youtube> | <youtube>99hniQYB6VM</youtube> | ||
| + | <b>HH6 | ||
| + | </b><br>BB6 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
== Fraud Detection == | == Fraud Detection == | ||
| Line 63: | Line 184: | ||
* [http://emerj.com/ai-sector-overviews/ai-for-health-insurance-fraud-detection-current-applications/?utm_term=43496&utm_medium=ai-for-health-insurance-fraud-detection-current-applications%2F&utm_campaign=broadcast&utm_source=email&utm_content=&_ke=eyJrbF9lbWFpbCI6ICJicGVhdEBlcHJvY2Vzc3NvbHV0aW9ucy5jb20iLCAia2xfY29tcGFueV9pZCI6ICJNanhacWcifQ%3D%3D AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia] | * [http://emerj.com/ai-sector-overviews/ai-for-health-insurance-fraud-detection-current-applications/?utm_term=43496&utm_medium=ai-for-health-insurance-fraud-detection-current-applications%2F&utm_campaign=broadcast&utm_source=email&utm_content=&_ke=eyJrbF9lbWFpbCI6ICJicGVhdEBlcHJvY2Vzc3NvbHV0aW9ucy5jb20iLCAia2xfY29tcGFueV9pZCI6ICJNanhacWcifQ%3D%3D AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia] | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>PpiO0S-OQS0</youtube> | <youtube>PpiO0S-OQS0</youtube> | ||
| + | <b>HH1 | ||
| + | </b><br>BB1 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>JNAu-wn3y0k</youtube> | <youtube>JNAu-wn3y0k</youtube> | ||
| + | <b>HH2 | ||
| + | </b><br>BB2 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>gCWBFyFTxVU</youtube> | <youtube>gCWBFyFTxVU</youtube> | ||
| + | <b>HH3 | ||
| + | </b><br>BB3 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>m7htZ7PWQE8</youtube> | <youtube>m7htZ7PWQE8</youtube> | ||
| + | <b>HH4 | ||
| + | </b><br>BB4 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
= Data Center Security = | = Data Center Security = | ||
| + | |||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>X-0V6bYfTpA</youtube> | <youtube>X-0V6bYfTpA</youtube> | ||
| + | <b>HH1 | ||
| + | </b><br>BB1 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>kd33UVZhnAA</youtube> | <youtube>kd33UVZhnAA</youtube> | ||
| + | <b>HH2 | ||
| + | </b><br>BB2 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>XZmGGAbHqa0</youtube> | <youtube>XZmGGAbHqa0</youtube> | ||
| + | <b>HH3 | ||
| + | </b><br>BB3 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>CM8O7kJ-faQ</youtube> | <youtube>CM8O7kJ-faQ</youtube> | ||
| + | <b>HH4 | ||
| + | </b><br>BB4 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
| + | {|<!-- T --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>JgCvam5pKks</youtube> | <youtube>JgCvam5pKks</youtube> | ||
| + | <b>HH5 | ||
| + | </b><br>BB5 | ||
| + | |} | ||
| + | |<!-- M --> | ||
| + | | valign="top" | | ||
| + | {| class="wikitable" style="width: 550px;" | ||
| + | || | ||
<youtube>gl__LOOHVWM</youtube> | <youtube>gl__LOOHVWM</youtube> | ||
| + | <b>HH6 | ||
| + | </b><br>BB6 | ||
| + | |} | ||
| + | |}<!-- B --> | ||
Revision as of 18:47, 5 October 2020
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Defense: Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)
- Cybersecurity: Evaluating & Selling
- (Artificial) Immune System
- 5G Security
- Useful Models ...find outliers:
- Detecting Malicious Requests with Keras & TensorFlow | Adam Kusey - Medium
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
- Breaking Down the Tencent 2018 Cybersecurity Report
- Chronicle combines all the best parts of Google and X culture
- Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind
- The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture
- Watch me Build a Cybersecurity Startup | Siraj Raval
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia
|
|
|
|
Data Center Security
|
|
|
|
|
|