-
Notifications
You must be signed in to change notification settings - Fork 25
Data science cyber security
Pradyumna Joshi edited this page May 21, 2020
·
3 revisions
- Data analysis for cyber security - https://towardsdatascience.com/data-analysis-for-cyber-security-101-detecting-lateral-movement-2026216de439
- Applying data science to cyber security - https://towardsdatascience.com/applying-data-science-to-cybersecurity-network-attacks-events-219fb6312f54
- Detecting real time and unsupervised anomalies - https://towardsdatascience.com/detecting-real-time-and-unsupervised-anomalies-in-streaming-data-a-starting-point-760a4bacbdf8
- Brief overview of outlier techniques - https://towardsdatascience.com/a-brief-overview-of-outlier-detection-techniques-1e0b2c19e561
- Detecting data exfiltration - https://towardsdatascience.com/data-analysis-for-cybersecurity-101-detecting-data-exfiltration-ae887594f675
- comprehensive survey on machine learning for networking - https://jisajournal.springeropen.com/articles/10.1186/s13174-018-0087-2
- statistical-significance explained - https://towardsdatascience.com/statistical-significance-hypothesis-testing-the-normal-curve-and-p-values-93274fa32687
- Fast observability using Canonical log lines - https://stripe.com/en-in/blog/canonical-log-lines
- Bro log file analysis using panda - https://medium.com/@Flying_glasses/bro-log-file-analysis-using-python-and-pandas-2375cfdaec3f