Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Graph-Charged Cybersecurity Intelligence
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Overview
- 3 Context
- 4 Goals
- 5 Pipeline
- 6 Anomaly sessions
- 7 Logs
- 8 Data
- 9 Decrease Data
- 10 Results
- 11 Precision
- 12 Graphs
- 13 Graph Search
- 14 Virtual Nodes
- 15 What do we get
- 16 What to do
- 17 Trust the model
- 18 Graph Neural Network Explainer
- 19 Graph Neural Network Investigation
- 20 Challenges
- 21 Contact us