Apresentações
(2)Gostaram
(36)NLP techniques for log analysis
Jacob Perkins
•
Há 5 anos
Detecting Malicious SSL Certificates Using Bro
Andrew Beard
•
Há 7 anos
Skydive, real-time network analyzer, container integration
Sylvain Afchain
•
Há 7 anos
Probabilistic Programming: Why, What, How, When?
Salesforce Engineering
•
Há 9 anos
Machine Learning and Logging for Monitoring Microservices
Daniel Berman
•
Há 7 anos
Word representation: SVD, LSA, Word2Vec
ananth
•
Há 7 anos
A Panorama of Natural Language Processing
Ted Xiao
•
Há 7 anos
Neural Text Embeddings for Information Retrieval (WSDM 2017)
Bhaskar Mitra
•
Há 7 anos
word embeddings and applications to machine translation and sentiment analysis
Mostapha Benhenda
•
Há 9 anos
Which Algorithms Really Matter
Ted Dunning
•
Há 10 anos
Visual-Semantic Embeddings: some thoughts on Language
Roelof Pieters
•
Há 9 anos
A Simple Introduction to Word Embeddings
Bhaskar Mitra
•
Há 8 anos
Learning Financial Market Data with Recurrent Autoencoders and TensorFlow
Altoros
•
Há 7 anos
Attention mechanisms with tensorflow
Keon Kim
•
Há 7 anos
Deep learning and feature extraction for time series forecasting
Pavel Filonov
•
Há 7 anos
Recurrent Networks and LSTM deep dive
Alex Kalinin
•
Há 7 anos
Understanding Blockchains
BlockStars.io
•
Há 8 anos
Intro to Deep Learning for Question Answering
Traian Rebedea
•
Há 7 anos
Question Answering - Application and Challenges
Jens Lehmann
•
Há 8 anos
TiC
Cory Kennedy
•
Há 8 anos
TOR Packet Analysis - Locating Identifying Markers
Brent Muir
•
Há 10 anos
Deep Learning in Computer Vision
Sungjoon Choi
•
Há 7 anos
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk Tuesday
AlienVault
•
Há 10 anos
Threat Intelligence from Honeypots for Active Defense
Tripwire
•
Há 9 anos
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networking
Open Networking Perú (Opennetsoft)
•
Há 8 anos
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci)
Alex Pinto
•
Há 9 anos
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on the Cheap
Andrew Morris
•
Há 9 anos
2016-JAN-28 -- High Performance Production Databases on Ceph
Ceph Community
•
Há 8 anos
The HaLVM: A Simple Platform for Simple Platforms
The Linux Foundation
•
Há 11 anos
Personal Information
Organização/Local de trabalho
Beijing, China China
Marcadores
fastflux ffsn
malware rootkit
Ver mais