Difference between revisions of "Cybersecurity"
| Line 25: | Line 25: | ||
** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]] | ** [[Bidirectional Long Short-Term Memory (BI-LSTM) with Attention Mechanism]] | ||
* [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO] | * [http://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO] | ||
| − | |||
* [http://www.graphistry.com/ graphistry.com] | * [http://www.graphistry.com/ graphistry.com] | ||
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov] | * [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov] | ||
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.” | ** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.” | ||
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]] | * Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]] | ||
| + | * [http://medium.com/syncedreview/breaking-down-the-tencent-2018-cybersecurity-report-26b3befde3f4 Breaking Down the Tencent 2018 Cybersecurity Report] | ||
Revision as of 21:23, 6 February 2019
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Government Services
- Cybersecurity: Evaluating & Selling
- Useful Models ...find outliers:
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
- Breaking Down the Tencent 2018 Cybersecurity Report
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia