CyberSecurity Tech Categories
For this conversation, let’s consider clustering, dimensionality reduction, and association rule learning as the main approaches within unsupervised learning
To approach this HUGE TOPIC, let’s break down it into smaller pieces.
- Data type? What kind of structured/semistructured data sets will be seen in this field.
- What kind of attacker?
- Model attack: On purpose to fill in fake data.
- Identify GAN or Fake Something. Likes: fake spam email. do something to cracking the auto detection. Fake click on Ads
-
DS devops
DevOps is a set of practices that combines software development (Dev) and IT operations