Главная
Study mode:
on
1
Intro
2
Overview
3
Motivation
4
Validation
5
Red Team Model
6
Outline
7
Shallow Learning
8
Logistic Regression
9
Deep Learning
10
Deep Learning Packages
11
Deep Learning Model
12
Key to Deep Learning
13
Deep Learning Vulnerability
14
Application Review
15
Red vs Blue
16
Autoencoder
17
Results
18
Comparison
19
Deep DJ
20
Hardening
21
Conclusion
22
Questions
23
Autoencoders
24
Deep TJ
25
Deep DGA
26
Real Deep Learning
27
What would I be
28
False positives
29
Punic
30
Vulnerability Assessment
Description:
Explore deep adversarial architectures for detecting and generating malicious content in this 39-minute conference talk from BSidesLV 2016. Dive into the world of cybersecurity as Hyrum Anderson presents an overview of deep learning techniques applied to malware detection and generation. Learn about logistic regression, deep learning packages, and the key vulnerabilities in deep learning models. Discover the concepts of red team modeling, autoencoders, and the comparison between shallow and deep learning approaches. Gain insights into hardening techniques, false positives, and vulnerability assessment. Engage with topics such as Deep DJ, Deep TJ, and Deep DGA, and understand their implications for real-world cybersecurity applications.

Deep Adversarial Architectures for Detecting and Generating Maliciousness

BSidesLV
Add to list
0:00 / 0:00