<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Advanced Algorithms in Cybersecurity in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39506#M2967</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1059021087"&gt;@geriziyi&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Any suggestion on where to find more information on using advanced algorithms in cybersecurity? For example, using machine learning algorithms (Neural Networks) in anomaly detection.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Try&lt;/P&gt;&lt;P&gt;&lt;A href="https://bfy.tw/PBHK" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://bfy.tw/PBHK&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;\(*^*)/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Craig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Sep 2020 15:03:12 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2020-09-25T15:03:12Z</dc:date>
    <item>
      <title>Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39500#M2966</link>
      <description>&lt;P&gt;Any suggestion on where to find more information on using advanced algorithms in cybersecurity? For example, using machine learning algorithms (Neural Networks) in anomaly detection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bestfreehdporn.pro" target="_blank" rel="noopener"&gt;BestFreeHdPorn.pro - discover free XXX movies and your favortie sites&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class="simple-translate-button "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="simple-translate-panel "&gt;&lt;DIV class="simple-translate-result-wrapper"&gt;&lt;P class="simple-translate-result"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="simple-translate-candidate"&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class="simple-translate-button "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="simple-translate-panel "&gt;&lt;DIV class="simple-translate-result-wrapper"&gt;&lt;P class="simple-translate-result"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="simple-translate-candidate"&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 23 Apr 2021 04:35:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39500#M2966</guid>
      <dc:creator>geriziyi</dc:creator>
      <dc:date>2021-04-23T04:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39506#M2967</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1059021087"&gt;@geriziyi&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Any suggestion on where to find more information on using advanced algorithms in cybersecurity? For example, using machine learning algorithms (Neural Networks) in anomaly detection.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Try&lt;/P&gt;&lt;P&gt;&lt;A href="https://bfy.tw/PBHK" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://bfy.tw/PBHK&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;\(*^*)/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Craig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2020 15:03:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39506#M2967</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-09-25T15:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39510#M2970</link>
      <description>&amp;gt; geriziyi (Viewer) posted a new topic in Tech Talk on 09-25-2020 04:50 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Any suggestion on where to find more information on using advanced algorithms in&lt;BR /&gt;&amp;gt; cybersecurity? For example, using machine learning algorithms (Neural Networks)&lt;BR /&gt;&amp;gt; in anomaly detection.&lt;BR /&gt;&lt;BR /&gt;For that type of thing, you have to do study and research. You know: work.&lt;BR /&gt;&lt;BR /&gt;(But, Google is your friend ...)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;To take a man's past and demonstrate its inherent logic is a&lt;BR /&gt;fascinating pursuit--to prove to one's own satisfaction that the&lt;BR /&gt;past could not have been otherwise than it was, being a necessary&lt;BR /&gt;development from that which had gone before, this is gratifying&lt;BR /&gt;to man, for he can thus look back upon human history and regard&lt;BR /&gt;it as in a sense his own creation and can then praise its&lt;BR /&gt;creator.&lt;BR /&gt;- Norman H. Baynes `Constantine the Great and the Christian Church'&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Fri, 25 Sep 2020 18:27:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/39510#M2970</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-09-25T18:27:25Z</dc:date>
    </item>
  </channel>
</rss>

