Skip to content

ML in Cybersecurity

Applications

  • Detection
    • Malware
    • Intrusion events
    • Phishing
    • Botnets
  • Authentication
    • Biometrics
  • Forensics
    • Threat Actor fingerprinting
  • Pen-testing

Challenges

  • Labelling
    • Few datasets
    • Unbalanced
    • Unlabelled
  • Heterogeneity
    • Tabular data
    • Network graphs
    • Concept drift
  • Volume
    • Tera-Petabytes
    • Streaming
  • Obfuscation
    • Discrimination

Solution

- Transfer learning for Adversarial discriminative domain adaptation

Last Updated: 2024-12-26 ; Contributors: AhmedThahir, web-flow

Comments