Author: Dmitrijs Trizna
-
This article discusses a mindset on building production-ready machine learning solutions when applied to cyber-security…
14 min read -
Evaluation of Transformer Neural Network Modeling Methodologies applied to Behavior Malware Traces.
13 min read -
Shell Language Processing: Machine Learning for Security Intrusion Detection with Linux auditd
CybersecurityHow-to guide with code samples for specialists willing to apply data science techniques for solving…
13 min read -
Anomaly detection engineering based on ubiquitous Zipfian distribution in enterprise security telemetry.
10 min read