Completed
Document Analysis Pipeline
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Problem Space
- 4 File Formats
- 5 Click Rates
- 6 Web Browsing Security
- 7 Mail vs Web
- 8 Document Analysis Pipeline
- 9 Evaluation Criteria
- 10 File Type Detection
- 11 Problems with File Type Detection
- 12 Webpage Example
- 13 Sandbox
- 14 CDLs
- 15 Remote Viewing
- 16 RealTime Pipeline
- 17 Offline Pipeline
- 18 Summary