Kaspersky has announced a major update to Kaspersky Anti Targeted Attack 8.0 (KATA 8.0), designed to help organizations ...
Dr. James McCaffrey of Microsoft Research tackles the process of examining a set of source data to find data items that are different in some way from the majority of the source items. Data anomaly ...
What is explainable AI (XAI)? What are some of the use cases for XAI? What are the technology requirements for implementing XAI? Anomaly detection is the process of identifying when something deviates ...
Does network behavior anomaly detection provide a true security solution against viruses and worms? Two experts in the field debate the issue in this week’s Face-off. Rothman: Network issues have ...
The US Army Analytics Group (AAG) provides analytical services for various organizational operations and functions, including cybersecurity. AAG signed a Cooperative Research and Development Agreement ...
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. In August 2015, American Airlines mistakenly sold plane tickets at discounts of up to 90% due to a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results