Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 25: Line 25:
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]]  
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO]
 
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
 
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
 
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
 
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 +
* [http://medium.com/syncedreview/breaking-down-the-tencent-2018-cybersecurity-report-26b3befde3f4 Breaking Down the Tencent 2018 Cybersecurity Report]
  
  

Revision as of 21:23, 6 February 2019

Youtube search... ...Google search


Fraud Detection