Skip to content
View disesdi's full-sized avatar
Block or Report

Block or report disesdi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
disesdi/README.md

Osiyo! My name is Susanna, aka Disesdi.

Chief Data Officer @ BobiHealth | OWASP AI Exchange Core Team Member | NIST AI Safety Institute Consortium (AISIC) | AI/ML Architect & Security Researcher | Purple Teamer | AISec, Information Warfare, Policy | Native | ᏥᏣᎳᎩ

🕷

Follow me on LinkedIn


Writing: hypr.systems

Security projects: anglesofattack.io

Pronouns: any


My GitHub Stats

Projects:

An OODA Loop-based game theoretic model of information warfare in AI/ML systems, with boolean-path threat modeling & cyber resiliency metrics, + a secure, operationalized, platform-agnostic, fully audited debiasing architecture adapted to the canonical MLOps development cycle
A repo for some of the most influential papers, books, & other media on machine learning operations (MLOps), adversarial machine learning, AIML policy and compliance, & more.
Multi-class password entropy analysis with TF-IDF vectorization and Extreme Gradient Boosting
Exploring machine learning attacks on Physical Unclonable Functions (PUFs), a proposed authentication method for resource-constrained and security-vulnerable applications such as Unmanned Aircraft Systems (UAS), and Internet of Things (IOT) devices
A proof-of-concept for evaluating cultural bias on small corpora using cosine similarity and Word2Vec neural networks, extending the Word Embedding Association Test (WEAT) framework proposed in 2016 by Caliskan et al
A python game theory project to auto-generate multi-strategy Axelrod tournaments, & visualize their results

Certificates:

Cybersecurity Policy for Aviation and Internet Infrastructures - University of Colorado 8JU6AFZSWSQ2
Digitalisation in Aeronautics - Technical University of Munich CLFHURZT5P27
Palo Alto Networks Cybersecurity Foundations - Palo Alto Networks AKCVN7NW9L2P
Cybersecurity Roles, Processes & Operating System Security - IBM XF59TGHNNERG
Cybersecurity Compliance Framework & System Administration - IBM UNKJ9XW9FBU3
Cyber Threat Intelligence - IBM 34BASRB7Q3YH
Penetration Testing, Incident Response and Forensics - IBM FKF2T5CTM8QR
Network Security & Database Vulnerabilities - IBM ESEUHCJ9FCFF
Python for Active Defense - Infosec B7X8AKXF7NYB
Python for Command-and-control, Exfiltration and Impact - Infosec MA6CWHUF622A
Credential Access, discovery, lateral movement & collection - Infosec 35UZ965WHBAA
Execution, persistence, privilege escalation and evasion - Infosec 57K8K48WGW73
Python for Cybersecurity Specialization - Infosec DGZVN4847K5P
Security Analyst Fundamentals Specialization - IBM 5TPFXM9NG6MT
IT Fundamentals for Cybersecurity Specialization - IBM A2RM3XPTA7FK
IBM Cybersecurity Analyst Specialization - IBM R66Q59JPWBL8
IBM Fundamentals of Scalable Data Science - IBM HJW55WWBFTCJ
IBM Advanced Machine Learning and Signal Processing - IBM PJYXKUEEC3E4

🕷

Pinned

  1. mlsecops_references mlsecops_references Public

    18 4

  2. ics_ensemble ics_ensemble Public

    Jupyter Notebook

  3. pufs pufs Public

    Jupyter Notebook

  4. semantic_space_and_size semantic_space_and_size Public

    Jupyter Notebook

  5. steganography_detection_with_machine_learning steganography_detection_with_machine_learning Public

    Jupyter Notebook

  6. auto_axelrod auto_axelrod Public

    Jupyter Notebook 1