Presentations
(2)Likes
(36)NLP techniques for log analysis
Jacob Perkins
•
5 years ago
Detecting Malicious SSL Certificates Using Bro
Andrew Beard
•
7 years ago
Skydive, real-time network analyzer, container integration
Sylvain Afchain
•
7 years ago
Probabilistic Programming: Why, What, How, When?
Salesforce Engineering
•
9 years ago
Machine Learning and Logging for Monitoring Microservices
Daniel Berman
•
7 years ago
Word representation: SVD, LSA, Word2Vec
ananth
•
7 years ago
A Panorama of Natural Language Processing
Ted Xiao
•
7 years ago
Neural Text Embeddings for Information Retrieval (WSDM 2017)
Bhaskar Mitra
•
7 years ago
word embeddings and applications to machine translation and sentiment analysis
Mostapha Benhenda
•
9 years ago
Which Algorithms Really Matter
Ted Dunning
•
10 years ago
Visual-Semantic Embeddings: some thoughts on Language
Roelof Pieters
•
9 years ago
A Simple Introduction to Word Embeddings
Bhaskar Mitra
•
8 years ago
Learning Financial Market Data with Recurrent Autoencoders and TensorFlow
Altoros
•
7 years ago
Attention mechanisms with tensorflow
Keon Kim
•
7 years ago
Deep learning and feature extraction for time series forecasting
Pavel Filonov
•
7 years ago
Recurrent Networks and LSTM deep dive
Alex Kalinin
•
7 years ago
Understanding Blockchains
BlockStars.io
•
8 years ago
Intro to Deep Learning for Question Answering
Traian Rebedea
•
7 years ago
Question Answering - Application and Challenges
Jens Lehmann
•
8 years ago
TiC
Cory Kennedy
•
8 years ago
TOR Packet Analysis - Locating Identifying Markers
Brent Muir
•
10 years ago
Deep Learning in Computer Vision
Sungjoon Choi
•
7 years ago
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk Tuesday
AlienVault
•
10 years ago
Threat Intelligence from Honeypots for Active Defense
Tripwire
•
9 years ago
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networking
Open Networking Perú (Opennetsoft)
•
8 years ago
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci)
Alex Pinto
•
9 years ago
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on the Cheap
Andrew Morris
•
9 years ago
2016-JAN-28 -- High Performance Production Databases on Ceph
Ceph Community
•
8 years ago
The HaLVM: A Simple Platform for Simple Platforms
The Linux Foundation
•
11 years ago
Personal Information
Organization / Workplace
Beijing, China China
Tags
fastflux ffsn
malware rootkit
See more