Jump to content

Search the Community

Showing results for tags 'machine learning'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 3 results

  1. Does anyone have this book "Introduction to Python for the Computer and Data Sciences: Learning to Program in a World of Big Data and AI Harvey Deitel" I look for it almost everywhere! I would really appreciate if you share it with me !
  2. Hi, I'm searching for a dataset which contains several payloads which used for systems and network attacks. I'm working on a project which aims to classify them using a supervised machine learning technique. I would like to have it as the following (but even if you have something similar, it would be ok, I will check it and adapt it to the model) Payload | Description(i.e buffer overflow, remote code execution ... etc) | Signatures (port open, OS, IPversion ... etc)| Systems or Network | appreciate your help. Sincerely,
  3. GeekPwn cyber contests are debuting at Def Con 26 to extend its mission to fostering a knowledge exchange platform and community for cutting edge security research. These challenges help accelerate new machine learning and IoT applications that enable companies to better fortify their systems and processes. Interested participants can find more details below and register at https://wj.qq.com/s/1343875/57eb. Robot Agent Challenge: August 10 @ 10:00-13:00 | Caesars Palace, Emperors Level Each pre-qualified team will bring a miniature robot designed to infiltrate a room and breach various smart devices on-site. Teams will remotely manoeuvre the robots to evade laser intrusion detectors and surveillance cameras, install a covert listening device, open a safe by entering the password on a keyboard, and retrieve information in target computers. CAAD CTF Contest: August 10 @ 10:00-13:09 | Caesars Palace, Emperors Level Pre-qualified teams will test their image classifiers in six rounds where each team receives a different image to modify for the purposes of tricking another team’s machine learning classifier to mis-classify the image into a specified object of the judges’ choosing. The images are unknown to participants until the contest starts, at which time classifiers will undergo an accuracy test. Concurrently taking place online through September is GeekPwn’s CAAD competition, which comprises of three categories for molding AI into attack and defense algorithms dealing with image classification: non-targeted adversarial attack, targeted adversarial attack, and defense against adversarial attack. Additionally, GeekPwn’s CAAD Village (Flamingo Hotel, Lake Mead | August 10 & 11) will present a selection of AI security talks and demos from industry researchers that highlight methods for manipulating machine learning classifiers.
×
×
  • Create New...