<--- Back to Details
First PageDocument Content
Machine learning / Word2vec / Random walk / Graph / Mathematics / Learning / Application software
Date: 2016-06-23 15:50:48
Machine learning
Word2vec
Random walk
Graph
Mathematics
Learning
Application software

Detecting malicious behavior in network and endpoint logs is an extremely challenging task: large and complex data sets, highly dynamic innocuous behavior, and intelligent adversaries contribute to the difficulty. Even a

Add to Reading List

Source URL: mmds-data.org

Download Document from Source Website

File Size: 13,98 KB

Share Document on Facebook

Similar Documents