Machine learning and AI

Machine learning and AI
Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is exp

May 02, 2018
Dimitar Kostadinov
Machine learning and AI
Artificial Intelligence (AI) - Machine Learning (ML) - Deep Learning (DL) Artificial intelligence as a term dates back to the 1950s, but only recently is com

May 01, 2018
Dimitar Kostadinov
Machine learning and AI
Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the

February 17, 2018
Daniel Dimov
Machine learning and AI
As we progressively get more dependent on technological innovation in our daily lives, we open ourselves up to cyber-attacks. Each device that we use today i

November 06, 2017
Irfan Shakeel
Machine learning and AI
Introduced in 1997, the term "Big Data" has grown in popularity in the past years. [pkadzone zone="main_top"] Credit: IBM-Big-Data-Definitions by DigitalRalp

June 16, 2017
Dimitar Kostadinov
Machine learning and AI
Cyber-attackers are moving towards automation to launch cyber-attacks more frequently, while many organizations are still using manual systems and strategies

May 26, 2017
Irfan Shakeel
Machine learning and AI
Understanding Artificial Intelligence Artificial Intelligence or AI is the intelligence shown by machines. Usually, the term Artificial Intelligence is used

May 01, 2017
Chiragh Dewan
Machine learning and AI
Machine Learning is a subfield of computer science that aims to give computers the ability to learn from data instead of being explicitly programmed, thus le

March 28, 2017
Achraf Belaarch
Machine learning and AI
The growing influence of automation on daily life is noticeable everywhere. The news is full of job-cut announcements, often justified by automation projects

October 26, 2016
Frank Siemons
Machine learning and AI
For decades, Information security analysts have been scanning through security logs trying to find anomalies that could lead to security incidents. In the be

March 10, 2016
Frank SiemonsLearn Cybersecurity Data Science
Build your skills with the latest cutting-edge tools in cybersecurity data science.- Perform malware analysis
- Build an IDS
- ML for social engineering
- ML for pentesting
- And more
In this series
- The future of machine learning in cybersecurity
- How artificial intelligence is transforming cybersecurity in 2024
- AI and machine learning career paths, trends and job prospects
- Will a Digital Bill of Rights solve machine learning and privacy issues?
- Engineering personality analysis from machine learning
- Engineering speech recognition from machine learning
- Engineering voice impersonation from machine learning
- Machine learning for social engineering
- Setting up a virtual lab for cybersecurity data science
- Deanonymizing Tor using ML
- How artificial intelligence is changing social engineering
- Federated Learning
- Spam Filtering
- AI for intrusion detection: Conquering the unknown unknowns
- AI and machine learning and their uses in cybersecurity
- Cyber Work: How data science and machine learning are affecting cybersecurity
- How to catch malware with artificial intelligence
- Cybersecurity Data Science
- The difference between AI and machine learning
- AI in cybersecurity 101
- How Criminals Can Exploit AI
- Cooperation between Humans and Artificial Intelligence in the Name of Security
- Privacy Concerns About Emotional Chatbots
- Is AI really the Future of Cyber Security
- Big Data Discrimination
- How is AI Addressing Cyber Security Challenges?
- Artificial Intelligence and Its Impact on Cyber Security
- Machine learning for malware detection
- The Impact of Automation on the IT Security Job Market
- Developments in Machine Learning vs. Traditional SIEM Solutions
- Why Artificial Neural Networks (ANN) Technology Offers a Promising Future in IDS/IPS
- Cybersecurity and Artificial Intelligence: A Dangerous Mix
- Machine Learning Part 3: Ranking
- Machine Learning : Naïve Bayes Rule for Malware Detection and Classification
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!