Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools. Joshua Saxe, Chief Data Scientist, Sophos
|
|
- Earl Jenkins
- 5 years ago
- Views:
Transcription
1 Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools Joshua Saxe, Chief Data Scientist, Sophos
2 About your speaker
3 Your speaker s Sophos You
4 Security Data Science Machine learning Data Visualization Databases, cloud engineering My focus today Deep learning (a.k.a. deep neural networks) other machine learning approaches
5 This is deep learning: real time computer vision
6 This is deep learning: computer vision + reinforcement learning
7 This is deep learning: new content generation
8 This is deep learning: detection of previously unseen URLs Neural network suspicious score, ranges from 0-1
9 The deep learning revolution in numbers (malware detection) Signatures + neural network Deep neural net (no updates!) Signatures only (daily updates)
10 The deep learning revolution in numbers Object detection in images Speech to text transcription
11 At Sophos we ve come to use deep learning everywhere HTML Android File paths / registry keys Windows PE
12 How deep learning and machine learning change security Old world Detection rules written manually Daily updates to blacklists and signatures Anti-virus data takes hundreds of megabytes Sub-par ability to detect new threats New world Detection models trained automatically Models need updating every month or two Models take about 10 megabytes on disk Breakthrough in ability to detect new threats
13 When neural networks go wrong: Neural network generated recipe
14 When neural networks go wrong: Neural network generated recipe
15 Sometimes deep learning is not the answer
16 How does machine learning based detection work? File size
17 File compression Deep learning uses non-linear decision boundaries 2d decision boundary in 3d space
18 File compression Real decision boundaries live in high dimensional space 2d decision boundary in 3d space 6d space would have a 5d decision boundary! Memory allocation
19 File compression Neural networks as machines for drawing decision boundaries File compression File size File size
20 File compression Automatic neuron weight tuning (a.k.a. learning) Behind the decision boundary learning process File compression File size File size
21 How neurons work as simple computational units
22 Behind the decision boundary learning process Bad weight settings (red) Current weights Weight 2 Weight 2 Good weight settings (green) Weight 1
23 Behind the decision boundary learning process Bad weight settings (red) Weight 2 Good weights Good weight settings (green) Weight 1
24 Behind the decision boundary learning process Bad weight settings (red) Weight 2 Weight 2 Good weight settings (green) Weight 1
25 What neural networks can see when learning Bad weight settings (red) Weight 2 Weight 2 Weight 1
26 Learning means walking downhill in the weight space Behind the decision boundary learning process File compression File size Weight 1
27 Neural networks: Bringing it all together Decision boundaries 6d space would have a 5d decision boundary! Memory allocation Learning from data Weight 2 Weight 1
28 Kitten break
29 Convolutional neurons No convolutions # lines in image brightness of image contrast in image # curves in image # white blobs in image Convolutions: automatic feature extraction
30 Convolutional neural network architecture
31 How our URL neural network works Output: malicious or benign? Output: building or no building?
32 How our neural network learns to think about URL characters Digits
33 Behind the scenes, URL convolutional neurons This Then this Then this Then this Then this Neural network suspicious score, ranges from 0-1
34 How our HTML neural network works
35 When neural networks go wrong: meme generation
36 When neural networks go wrong: meme generation
37
38 Key deep learning technologies Supporting Python libraries Deep learning stack
39 Deep learning hardware: fast GPUs and lots of memory
40 Making neural network rapid prototyping easy Architecture of our URL detector Keras code for our URL detector
41 Becoming a security data scientist
42 Qualities you need Basic intelligence (you all have it) Open-mindedness Boundless curiosity about data Obsession with results Skepticism of results
43 Collaborating with non-data scientist security researchers is key
44 Where to go from here
45
Demystifying Machine Learning
Demystifying Machine Learning Dmitry Figol, WW Enterprise Sales Systems Engineer - Programmability @dmfigol CTHRST-1002 Agenda Machine Learning examples What is Machine Learning Types of Machine Learning
More informationGarbage In, Garbage Out
Garbage In, Garbage Out How purportedly great ML models can be screwed up by bad data Hillary Sanders Data Scientist - operations team lead What I ll show... 1. Model accuracy claimed by security ML researchers
More informationMOBILE DEFEND. Powering Robust Mobile Security Solutions
MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile
More informationVinnie Saini Cloud Solution Architect Big Data & AI
Vinnie Saini Cloud Solution Architect Big Data & AI vasaini@microsoft.com data intelligence cloud Data + Intelligence + Cloud Extensible Applications Easy to consume Artificial Intelligence Most comprehensive
More informationReal protection against real threats
Real protection against real threats Protection for any device For home and office For new purchases and renewals * PCs, Macs and mobile devices running OS supported by Dr.Web. www.drweb.com OOO Doctor
More informationReduce Your Network's Attack Surface
WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements
More informationKaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,
Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms
More informationNVIDIA DGX SYSTEMS PURPOSE-BUILT FOR AI
NVIDIA DGX SYSTEMS PURPOSE-BUILT FOR AI Overview Unparalleled Value Product Portfolio Software Platform From Desk to Data Center to Cloud Summary AI researchers depend on computing performance to gain
More informationDeep Learning. Volker Tresp Summer 2014
Deep Learning Volker Tresp Summer 2014 1 Neural Network Winter and Revival While Machine Learning was flourishing, there was a Neural Network winter (late 1990 s until late 2000 s) Around 2010 there
More informationWhy data science is the new frontier in software development
Why data science is the new frontier in software development And why every developer should care Jeff Prosise jeffpro@wintellect.com @jprosise Assertion #1 Being a programmer is like being the god of your
More informationImageNet Classification with Deep Convolutional Neural Networks
ImageNet Classification with Deep Convolutional Neural Networks Alex Krizhevsky Ilya Sutskever Geoffrey Hinton University of Toronto Canada Paper with same name to appear in NIPS 2012 Main idea Architecture
More informationCharacterization and Benchmarking of Deep Learning. Natalia Vassilieva, PhD Sr. Research Manager
Characterization and Benchmarking of Deep Learning Natalia Vassilieva, PhD Sr. Research Manager Deep learning applications Vision Speech Text Other Search & information extraction Security/Video surveillance
More informationDEEP NEURAL NETWORKS FOR OBJECT DETECTION
DEEP NEURAL NETWORKS FOR OBJECT DETECTION Sergey Nikolenko Steklov Institute of Mathematics at St. Petersburg October 21, 2017, St. Petersburg, Russia Outline Bird s eye overview of deep learning Convolutional
More informationMachine Learning with Python
DEVNET-2163 Machine Learning with Python Dmitry Figol, SE WW Enterprise Sales @dmfigol Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationCode Mania Artificial Intelligence: a. Module - 1: Introduction to Artificial intelligence and Python:
Code Mania 2019 Artificial Intelligence: a. Module - 1: Introduction to Artificial intelligence and Python: 1. Introduction to Artificial Intelligence 2. Introduction to python programming and Environment
More informationNext Generation Endpoint Security Confused?
SESSION ID: CEM-W06 Next Generation Endpoint Security Confused? Greg Day VP & Chief Security Officer, EMEA Palo Alto Networks @GreDaySecurity Brief Intro Questions we will answer Do I need a new (NG) endpoint
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More informationAPPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE
APPLYING THE POWER OF AI TO YOUR VIDEO PRODUCTION STORAGE FINDING WHAT YOU NEED IN YOUR IN-HOUSE VIDEO STORAGE SECTION 1 You need ways to generate metadata for stored videos without time-consuming manual
More informationAI Model Training Platform
Amazon AWS for AI Model Management, Training, and Testing ROLE: Lead UX Designer DELIVERABLES: System Sitemap Wireframes Mockups VISION TEAM To make AI more accessible to the masses by creating a platform
More informationCopyright ECSC Group plc 2017 ECSC - UNRESTRICTED
Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED ECSC - UNRESTRICTED Introduction A Web Application Firewall (WAF) is, in our experience, the most important layer of defence against a wide range of attacks
More informationTechnical Brief: Domain Risk Score Proactively uncover threats using DNS and data science
Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science 310 Million + Current Domain Names 11 Billion+ Historical Domain Profiles 5 Million+ New Domain Profiles Daily
More informationAntivirus Myths and Facts. By Helmuth Freericks
By Helmuth Freericks Introduction As an active, veteran member of the antivirus community and a pioneer of one of the earliest antivirus companies, I have spoken with thousands of people with an interest
More informationEnterprise Ransomware Mitigations
打造數碼安全校園 Enterprise Ransomware Mitigations Windows 10, Edge Browser, Office ATP Enterprise Mobility Suite (EMS) ATP OneDrive for Business Azure Backup 3rd party Cloud Backup THE WINDOWS CLIENT DEFENSE
More informationImperva Incapsula Website Security
Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as
More informationHow to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis
White paper How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis AhnLab, Inc. Table of Contents Introduction... 1 Multidimensional Analysis... 1 Cloud-based Analysis...
More informationA Quick Guide on Training a neural network using Keras.
A Quick Guide on Training a neural network using Keras. TensorFlow and Keras Keras Open source High level, less flexible Easy to learn Perfect for quick implementations Starts by François Chollet from
More informationAgenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options
Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationCMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro
CMU 15-781 Lecture 18: Deep learning and Vision: Convolutional neural networks Teacher: Gianni A. Di Caro DEEP, SHALLOW, CONNECTED, SPARSE? Fully connected multi-layer feed-forward perceptrons: More powerful
More informationTesting Exploit-Prevention Mechanisms in Anti-Malware Products
Testing Exploit-Prevention Mechanisms in Anti-Malware Products Andreas Marx & Maik Morgenstern AV-Test GmbH, Magdeburg, Germany http://www.av-test.org Presented at the CARO Workshop 2009 in Budapest, Hungary
More information! References: ! Computer eyesight gets a lot more accurate, NY Times. ! Stanford CS 231n. ! Christopher Olah s blog. ! Take ECS 174!
Exams ECS 189 WEB PROGRAMMING! If you are satisfied with your scores on the two midterms, you can skip the final! As soon as your Photobooth and midterm are graded, I can give you your course grade (so
More informationAn Introduction to Deep Learning with RapidMiner. Philipp Schlunder - RapidMiner Research
An Introduction to Deep Learning with RapidMiner Philipp Schlunder - RapidMiner Research What s in store for today?. Things to know before getting started 2. What s Deep Learning anyway? 3. How to use
More informationPerception Engine: PRD v2 Capstone Project. Problem. Project Outcome
Problem Our partnered company, Aerospace Corp., seeks to analyze a large video database, in which objects should be recognizable and trackable. Currently, Aerospace does this manually by having humans
More informationKASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal
More informationWHITEPAPER. Pipelining Machine Learning Models Together
WHITEPAPER Pipelining Machine Learning Models Together Table of Contents Introduction 2 Performance and Organizational Benefits of Pipelining 4 Practical Use Case: Twitter Sentiment Analysis 5 Practical
More informationRetrospective Testing - How Good Heuristics Really Work
Retrospective Testing - How Good Heuristics Really Work Andreas Marx amarx@gega-it.de AV-Test.org University of Magdeburg GEGA IT-Solutions GbR Retrospective Testing I What it is: Use an old (archived)
More informationSpatial Localization and Detection. Lecture 8-1
Lecture 8: Spatial Localization and Detection Lecture 8-1 Administrative - Project Proposals were due on Saturday Homework 2 due Friday 2/5 Homework 1 grades out this week Midterm will be in-class on Wednesday
More informationTrend Micro SMB Endpoint Comparative Report Performed by AV-Test.org
Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org A test commissioned by Trend Micro and performed by AV-Test GmbH Executive Summary In May of 2011, AV-Test.org performed endpoint security
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationAutomated Response in Cyber Security SOC with Actionable Threat Intelligence
Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationWayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk
Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationexam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT
156-730.exam Number: 156-730 Passing Score: 800 Time Limit: 120 min File Version: 1.0 CHECKPOINT 156-730 Check Point Accredited Sandblast Administrator Version 1.0 Exam A QUESTION 1 Regarding a proper
More informationINTELLIGENT CYBER THREAT DEFENSE. Fight tomorrow s cyber threats in real time with cutting edge machine learning
INTELLIGENT CYBER THREAT DEFENSE Fight tomorrow s cyber threats in real time with cutting edge machine learning ARE YOU PREPARED? Businesses are being targeted by cyber criminals at an ever-increasing
More informationCS 4510/9010 Applied Machine Learning. Deep Learning. Paula Matuszek Fall copyright Paula Matuszek 2016
CS 4510/9010 Applied Machine Learning 1 Deep Learning Paula Matuszek Fall 2016 Beyond Simple Neural Nets 2 In the last few ideas we have seen some surprisingly rapid progress in some areas of AI Image
More informationFully Optimize FULLY OPTIMIZE YOUR DBA RESOURCES
Fully Optimize FULLY OPTIMIZE YOUR DBA RESOURCES IMPROVE SERVER PERFORMANCE, UPTIME, AND AVAILABILITY WHILE LOWERING COSTS WE LL COVER THESE TOP WAYS TO OPTIMIZE YOUR RESOURCES: 1 Be Smart About Your Wait
More informationThe Mathematics Behind Neural Networks
The Mathematics Behind Neural Networks Pattern Recognition and Machine Learning by Christopher M. Bishop Student: Shivam Agrawal Mentor: Nathaniel Monson Courtesy of xkcd.com The Black Box Training the
More informationThe Risks Associated with (unmanaged) PowerShell. Casting a hidden.net HITRUST Alliance
The Risks Associated with (unmanaged) PowerShell Casting a hidden.net 1 2018 HITRUST Alliance PowerShell as an Attack Platform Availability: Built-in command shell in every Windows 7/2008 R2 and newer
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.
More informationEvolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa
Evolution of Cyber Security Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa Nasser.Kettani@microsoft.com @nkettani MODERN SECURITY THREATS THERE ARE TWO KINDS OF BIG COMPANIES:
More informationDefend what you create. Why Dr.Web
Defend what you create Why Dr.Web 1. Company Russian anti-virus software developer Doctor Web has been in operation since 1992. Our customers The Russian government has trusted Doctor Web anti-virus products
More informationConnectWise Automate. What is ConnectWise Automate?
What is ConnectWise Automate? ConnectWise Automate is a remote monitoring and management tool (RMM) that allows us to actively track the health and performance of your IT network. We compile that data
More informationAt a Glance: Symantec Security.cloud vs Microsoft O365 E3
At a Glance: Symantec Email Security.cloud vs Microsoft O365 E3 Microsoft O365 E3 Security as a Feature Symantec Email Security.cloud Why This Is Important Spam Protection Third-party blacklists subscribed
More informationEncrypted Deep Learning: A Guide to Privacy Preserving Speech Processing
Encrypted Deep Learning: A Guide to Privacy Preserving Speech Processing Nigel Cannings CTO nigel.cannings@intelligentvoice.com www.intelligentvoice.com @intelligentvox #GTC17 For $100 What is this encrypted
More informationTHE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE
THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into
More informationData Science Tutorial
Eliezer Kanal Technical Manager, CERT Daniel DeCapria Data Scientist, ETC Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2017 SEI SEI Data Science in in Cybersecurity Symposium
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationSymantec Antivirus Manual Removal Tool Corporate Edition 10.x
Symantec Antivirus Manual Removal Tool Corporate Edition 10.x Learn how to download and run the Norton Removal Tool to uninstall the Norton products from your Looking for a free Virus and Spyware removal
More informationNorman SandBox Solutions. 15 January 2007 Righard J. Zwienenberg
P Norman SandBox Solutions Cortina 14 avenue J-B Clemen 92100 Boulogne-Billan Tel : +33 (0)1 41 10 26 Email : info@cortina.f 15 January 2007 Righard J. Zwienenberg P Source ; AV-Test, Andreas Marx, 2 Agenda
More informationMore about Windows OS Security
OPC Presentation 10-31-17 More about Windows OS Security By Len Groth PC Security by Listing Blacklisting Greylisting Whitelisting Blacklisting* (in Computing) A Blacklist is an access control system that
More informationSurviving the rise of. cybercrime. A new approach to threat prevention.
Surviving the rise of cybercrime. A new approach to threat prevention. About MailGuard Est.2001 MailGuard is an innovative cloudbased email & web filtering solution. Stops malicious threats like spear
More informationCeedo Client Family Products Security
ABOUT THIS DOCUMENT Ceedo Client Family Products Security NOTE: This document DOES NOT apply to Ceedo Desktop family of products. ABOUT THIS DOCUMENT The purpose of this document is to define how a company
More informationEdge Detection (with a sidelight introduction to linear, associative operators). Images
Images (we will, eventually, come back to imaging geometry. But, now that we know how images come from the world, we will examine operations on images). Edge Detection (with a sidelight introduction to
More informationTutorial on Keras CAP ADVANCED COMPUTER VISION SPRING 2018 KISHAN S ATHREY
Tutorial on Keras CAP 6412 - ADVANCED COMPUTER VISION SPRING 2018 KISHAN S ATHREY Deep learning packages TensorFlow Google PyTorch Facebook AI research Keras Francois Chollet (now at Google) Chainer Company
More informationMobile County Public School System Builds a More Secure Future with AMP for Endpoints
Mobile County Public School System Builds a More Secure Future with AMP for Endpoints Cisco AMP for Endpoints met our needs from all security standpoints. We re seeing more and AMP is catching things that
More informationNext Generation Privilege Identity Management
White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep
More informationDEEP LEARNING REVIEW. Yann LeCun, Yoshua Bengio & Geoffrey Hinton Nature Presented by Divya Chitimalla
DEEP LEARNING REVIEW Yann LeCun, Yoshua Bengio & Geoffrey Hinton Nature 2015 -Presented by Divya Chitimalla What is deep learning Deep learning allows computational models that are composed of multiple
More informationANTIVIRUS SITE PROTECTION (by SiteGuarding.com)
ANTIVIRUS SITE PROTECTION (by SiteGuarding.com) USER GUIDE Version 0.1.0 1 Table of content 1. INTRODUCTION. 3 2. HOW IT WORKS.... 6 3. HOW TO CONFIGURE.. 7 2 1. INTRODUCTION Antivirus Site Protection
More informationDEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER
DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER D-Zone DNS Firewall 18-10-20171 EXECUTIVE SUMMARY Cyber attacks continue to grow at an alarming rate with ransomware
More informationComodo APT Assessment Tool
rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo
More informationMailCore Pro User Guide
Welcome to your MailCore Pro Account MailCore Pro is a powerful collection of email and collaboration tools that add enterpriselevel features to regular group email. The following guide will take you through
More informationTrend Micro SMB Endpoint Comparative Report Performed by AV-Test.org
Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org Results from October 2010 Executive Summary In October of 2010, AV-Test.org performed endpoint security benchmark testing on five marketleading
More informationMaximum Security with Minimum Impact : Going Beyond Next Gen
SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT
More informationVoice, Image, Video : AI in action with AWS. 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Voice, Image, Video : AI in action with AWS A long heritage of machine learning at Amazon Personalized recommendations Fulfillment automation and inventory management Drones Voice driven interactions Inventing
More informationFeatures. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage
PRO Not just an app, but a friend for your phone. Product Highlights Fonetastic is an all-in-one app for Android devices. Built with multiple productivity and security features, it enhances your device
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationTrend Micro Enterprise Endpoint Comparative Report Performed by AV-Test.org
Trend Micro Enterprise Comparative Report Performed by AV-Test.org Results from October 2010 Executive Summary In October of 2010, AV-Test.org performed endpoint security benchmark testing on five marketleading
More informationHow GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics. Jan Neumann Comcast Labs DC May 10th, 2017
How GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics Jan Neumann Comcast Labs DC May 10th, 2017 Comcast Applied Artificial Intelligence Lab Media & Video Analytics Smart TV Deep Learning
More informationMigration With Duda.
Migration With Duda A Comprehensive Guide to the Opportunities and Considerations that Come with Website Migration for DIY and DIFM Solutions Providers. www.dudamobile.com Table of Contents Introduction
More informationThe Value of Automated Penetration Testing White Paper
The Value of Automated Penetration Testing White Paper Overview As an information security expert and the security manager of the company, I am well aware of the difficulties of enterprises and organizations
More informationCloudSwyft Learning-as-a-Service Course Catalog 2018 (Individual LaaS Course Catalog List)
CloudSwyft Learning-as-a-Service Course Catalog 2018 (Individual LaaS Course Catalog List) Microsoft Solution Latest Sl Area Refresh No. Course ID Run ID Course Name Mapping Date 1 AZURE202x 2 Microsoft
More informationHow to NEUTRALIZE Machine Learning based Anti-Malware Software. JunSeok Seo (boanproject) + JaeHwan Kim (Korea Univ)
How to NEUTRALIZE Machine Learning based Anti-Malware Software JunSeok Seo (boanproject) + JaeHwan Kim (Korea Univ) 2017. 7. 12 Who we are Jun-Seok, Seo (nababora) Vice President of Boanprjoect ( start-up
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention The evolution of malware threat mitigation Nguyễn Tiến Đức ntduc@juniper.net 1 Most network security strategies focus on security at the perimeter only outside in.
More informationScaling Convolutional Neural Networks on Reconfigurable Logic Michaela Blott, Principal Engineer, Xilinx Research
Scaling Convolutional Neural Networks on Reconfigurable Logic Michaela Blott, Principal Engineer, Xilinx Research Nick Fraser (Xilinx & USydney) Yaman Umuroglu (Xilinx & NTNU) Giulio Gambardella (Xilinx)
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationThe Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy
The Next Generation Security Platform Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy The Next Generation Enterprise Security Platform Core Value Proposition An Enterprise Security
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationBAYESIAN MACHINE LEARNING IN PYTHON: A/B TESTING UDEMY MASTERING MACHINE LEARNING FOR PENETRATION TESTING PACKT
PDF BAYESIAN MACHINE LEARNING IN PYTHON: A/B TESTING UDEMY MASTERING MACHINE LEARNING FOR PENETRATION TESTING PACKT 1 / 6 2 / 6 3 / 6 learning python testing pdf This course is all about A/B testing. A/B
More informationDEFECT INSPECTION FROM SCRATCH TO PRODUCTION. Andrew Liu, Ryan Shen Deep Learning Solution Architect
DEFECT INSPECTION FROM SCRATCH TO PRODUCTION Andrew Liu, Ryan Shen Deep Learning Solution Architect Defect Inspection and its challenges AGENDA NGC Docker images Model set up - Unet Data preparation -
More informationBehind the Yellow Curtain Symantec s Proactive Protection and Detection Technology
Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer 1 A Feedback Loop: Products and Big Data Intelligence
More informationCisco AMP Solution. Rene Straube CSE, Cisco Germany January 2017
Cisco AMP Solution Rene Straube CSE, Cisco Germany January 2017 The AMP Everywhere Architecture AMP Protection Across the Extended Network for an Integrated Threat Defense AMP Threat Intelligence Cloud
More informationPrevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,
Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009
More informationSophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central
Sophos Central for partners and customers: overview and new features Jonathan Shaw Senior Product Manager, Sophos Central What is Sophos Central? Partner Dashboard Admin Self Service Allows Partners to
More informationBitdefender GravityZone. Supreme protection against active threats for the SMB market
Bitdefender GravityZone Supreme protection against active threats for the SMB market Remain secure with industry-leading cybersecurity software Zero-day threats, viruses, and ransomware are prevalent in
More informationSOLUTION BRIEF Fulfill the promise of the cloud
SOLUTION BRIEF Fulfill the promise of the cloud NetApp Solutions for Amazon Web Services Fulfill the promise of the cloud NetApp Cloud Volumes Service for AWS: Move and manage more workloads faster Many
More information2015 The MathWorks, Inc. 1
2015 The MathWorks, Inc. 1 개발에서구현까지 MATLAB 환경에서의딥러닝 김종남 Application Engineer 2015 The MathWorks, Inc. 2 3 Why MATLAB for Deep Learning? MATLAB is Productive MATLAB is Fast MATLAB Integrates with Open Source
More information