Tags
security
information security
automate the hunt
adversary detection
malware
data science
stealth
hunting ground
code obfuscation
polymorphism
persistence
endgame
malicious behavior
apts
advanced persistent threats
boosted decision trees
malware detection
machine learning
See more
Presentations
(5)Tags
security
information security
automate the hunt
adversary detection
malware
data science
stealth
hunting ground
code obfuscation
polymorphism
persistence
endgame
malicious behavior
apts
advanced persistent threats
boosted decision trees
malware detection
machine learning
See more