Back to Results
First PageMeta Content
Machine learning / Word2vec / Random walk / Graph / Mathematics / Learning / Application software


Detecting malicious behavior in network and endpoint logs is an extremely challenging task: large and complex data sets, highly dynamic innocuous behavior, and intelligent adversaries contribute to the difficulty. Even a
Add to Reading List

Document Date: 2016-06-23 15:50:48


Open Document

File Size: 13,98 KB

Share Result on Facebook