Index
A
- A/B model testing, Feature: Feedback Loops, A/B Testing of Models
- access control
- defined, Real-World Uses of Machine Learning in Security
- network traffic analysis and, Access Control and Authentication
- account creation, Account Creation-Reputation scores
- bots and, Bot Activity
- reputation scores, Reputation scores-Reputation scores
- velocity features, Velocity features-Velocity features
- account takeover (ATO), Cyber Threat Landscape, Authentication and Account Takeover-Building your classifier
- activation functions, Neural Networks
- active authentication, Access Control and Authentication
- active learning, Feature: Feedback Loops, A/B Testing of Models
- active network attacks, Active attacks-Active attacks
- breaches, Active attacks
- DoS, Active attacks
- pivoting, Active attacks
- spoofing, Active attacks
- adb (Android Debug Bridge), Behavioral (dynamic) analysis
- ADMM (alternating direction method of multipliers), Performance Optimization
- advanced persistent threats (APT), Cyber Threat Landscape
- adversarial examples, Mitigating Adversarial Effects
- adversarial machine learning, Adversaries Using Machine Learning, Adversarial Machine Learning-Conclusion
- attack transferability, Attack Transferability
- defined, Adversarial Machine Learning
- evasion attacks, Attack Technique: Evasion Attack-Defense Against Evasion Attacks
- generative adversarial nets, Attack Transferability
- importance of, The Importance of Adversarial ML
- model poisoning attacks, Attack Technique: Model Poisoning-Defense Against Poisoning Attacks
- security ...
Get Machine Learning and Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.