Searched for: "the security of machine learning"
- Security (381)
- Data Management (10)
- Mobility (8)
- Software (8)
- Cloud (5)
- Networking (5)
- Servers (3)
- Storage (3)
- Virtualization (3)
- Browser (2)
- Broadband (1)
- Business Intelligence (1)
- Collaboration (1)
- Cxo (1)
- Disaster Recovery (1)
- Enterprise Software (1)
- Hardware (1)
- Open Source (1)
- Processors (1)
- Web Development (1)
- Windows (1)
About 439 results for "the security of machine learning"
Of the 10,000-plus staff at the Government Code and Cypher School during World War II, two-thirds were female. Three veteran servicewomen explain what life was like as part of the ...
Digital signatures can replace physical signatures for a more efficient and streamlined authorization process. Learn about what they can do and how they work.
How much does your business lose to fraud? If you don't know the answer, fraud is likely a taboo IT security topic at your organization. Argyle Data's CEO explains why it shouldn't...
Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few ...
Fraud Detection is one of the oldest areas of research. The requirement of an effective system that detects frauds effectively with zero loss exists until now. This is due to the i...
They're calling it a cyber war; so isn't the best way to prepare through live-speed, realistic training? Merit Network and the State of Michigan think so.
Network Intrusion Detection Using Semi-Supervised Learning Based on Normal Behaviour's Standard Deviation
Misuse detection is the traditional technique used in Network Intrusion Detection Systems (NIDSs) which relies on matching the current behavior of network with pre-defined attacks'...
Spam is defined as redundant and unwanted electronically letters, and now-a-days, it has created many problems in business life such as occupying networks bandwidth and the space o...
Various transaction activities like air ticket reservation, online banking, distance learning, group discussion and so on are carried out using Internet. Carrying out such activiti...
In this paper, the authors present a comprehensive review of recent developments in the application of machine learning algorithms to Spam filtering, focusing on textual approaches...