<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Advanced Algorithms in Cybersecurity in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16521#M633</link>
    <description>&lt;P&gt;Any suggestion on where to find more information on using advanced algorithms in cybersecurity? For example, using machine learning algorithms (Neural Networks) in anomaly detection.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:01:25 GMT</pubDate>
    <dc:creator>kpoole_isc2</dc:creator>
    <dc:date>2023-10-09T09:01:25Z</dc:date>
    <item>
      <title>Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16521#M633</link>
      <description>&lt;P&gt;Any suggestion on where to find more information on using advanced algorithms in cybersecurity? For example, using machine learning algorithms (Neural Networks) in anomaly detection.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:01:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16521#M633</guid>
      <dc:creator>kpoole_isc2</dc:creator>
      <dc:date>2023-10-09T09:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16531#M635</link>
      <description>&lt;P&gt;Cylance seems to be active in this field:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Introduction to AI for Security: &lt;A href="https://threatvector.cylance.com/en_us/home/introduction-to-ai-for-security.html" target="_blank"&gt;https://threatvector.cylance.com/en_us/home/introduction-to-ai-for-security.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And another thing might be:&amp;nbsp;&lt;A href="https://www.darktrace.com/en/" target="_blank"&gt;https://www.darktrace.com/en/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, I am not sure about "open source" AI stuff for IT sec yet.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:37:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16531#M635</guid>
      <dc:creator>solhuebner</dc:creator>
      <dc:date>2018-11-19T18:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16532#M636</link>
      <description>&amp;gt; kpoole_isc2 (Viewer) posted a new topic in Tech Talk on 11-19-2018 11:39 AM in&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Any suggestion on where to find more information on using advanced algorithms in&lt;BR /&gt;&amp;gt; cybersecurity? For example, using machine learning algorithms (Neural Networks)&lt;BR /&gt;&amp;gt; in anomaly detection.&lt;BR /&gt;&lt;BR /&gt;[Sigh.]&lt;BR /&gt;&lt;BR /&gt;You might want to study up on expert systems. Learn some functional&lt;BR /&gt;programming. (You'll probably need to learn Smalltalk, Eiffel, or Prolog to get a&lt;BR /&gt;grip on it.) Expert systems are probably better at anomaly detection. (of course,&lt;BR /&gt;you have to be an expert, first ...)&lt;BR /&gt;&lt;BR /&gt;You might want to study up on neural networks. Learning a bit of neurobiology&lt;BR /&gt;might help, as well. (Please note: the advice on never testing your system with&lt;BR /&gt;production data? That goes in spades for neural networks. And watch out for&lt;BR /&gt;superstitious learning ...)&lt;BR /&gt;&lt;BR /&gt;It's not *really* in this line, but you might try some genetic programming, as well.&lt;BR /&gt;Just to make sure you know where the boundaries are ...&lt;BR /&gt;&lt;BR /&gt;I'd talk to your local university and find out how many courses they have on&lt;BR /&gt;different types of AI and ML ...&lt;BR /&gt;&lt;BR /&gt;(And maybe do a bit of study on quantum computing, too, so you have something&lt;BR /&gt;to test your AI results against ...)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;Are you sure that [nine nine nine nine nine nine is] random?&lt;BR /&gt;That's the problem with randomness. You can never be sure.&lt;BR /&gt;&lt;A href="http://www.unitedmedia.com/comics/dilbert/archive/dilbert-20011025.html" target="_blank"&gt;www.unitedmedia.com/comics/dilbert/archive/dilbert-20011025.html&lt;/A&gt;&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:40:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16532#M636</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-11-19T18:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16533#M637</link>
      <description>Thanks for the insight</description>
      <pubDate>Mon, 19 Nov 2018 18:43:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16533#M637</guid>
      <dc:creator>KenBunce</dc:creator>
      <dc:date>2018-11-19T18:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16534#M638</link>
      <description>&lt;P&gt;There is a good ML course:&amp;nbsp;&lt;A href="https://www.coursera.org/learn/machine-learning" target="_blank"&gt;https://www.coursera.org/learn/machine-learning&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But you might want to use&amp;nbsp;&lt;A href="https://github.com/dibgerge/ml-coursera-python-assignments" target="_blank"&gt;https://github.com/dibgerge/ml-coursera-python-assignments&lt;/A&gt; to do it via Python.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is pretty heavy on math tbh. So "&lt;STRONG&gt;Introduction to Machine Learning for Coders&lt;/STRONG&gt;" might be a good alternative:&amp;nbsp;&lt;A href="https://course.fast.ai/ml" target="_blank"&gt;https://course.fast.ai/ml&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:44:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16534#M638</guid>
      <dc:creator>solhuebner</dc:creator>
      <dc:date>2018-11-19T18:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Algorithms in Cybersecurity</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16544#M639</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/984669611"&gt;@kpoole_isc2&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Any suggestion on where to find more information on using advanced algorithms in cybersecurity? For example, using machine learning algorithms (Neural Networks) in anomaly detection.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I believe your question may be too broad, without a clear&amp;nbsp;delineation of just what an algorithm is, or how they are used. For instance, a neural networks is not an algorithm, it&amp;nbsp;is a type of computing architecture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;gave you a good answer over in&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.isc2.org/t5/Tech-Talk/How-to-start-an-AI-ML-based-cybers-ecurity-business/m-p/16519#M632" target="_blank"&gt;https://community.isc2.org/t5/Tech-Talk/How-to-start-an-AI-ML-based-cybers-ecurity-business/m-p/16519#M632&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 22:28:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Advanced-Algorithms-in-Cybersecurity/m-p/16544#M639</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2018-11-19T22:28:01Z</dc:date>
    </item>
  </channel>
</rss>

