Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
AI for Cybersecurity - Overview of the Field and Promising Future Directions
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Outline
- 3 Agenda
- 4 AI for Cybersecurity Overview
- 5 AI for Cybersecurity Life Cycle
- 6 Data Sources
- 7 External Data Sources
- 8 Cyber Security Initiatives
- 9 Key Limitations
- 10 Promising Directions
- 11 Research Illustration
- 12 Existing AI for Cybersecurity Initiatives
- 13 Exploit Data
- 14 Vulnerability Assessment Data
- 15 Vulnerability Exploit Matching
- 16 Device Vulnerability Severity Metric
- 17 Vulnerability Assessment
- 18 Workforce Development
- 19 Funding
- 20 Conclusion
- 21 Questions
- 22 Minimum Data Set Size
- 23 Decision Automation
- 24 Weak Signals
- 25 Honey Pots
- 26 AI in IoT
- 27 What comes first
- 28 What is the best solution
- 29 AI ML
- 30 MITRE Framework
- 31 Business Logic Vulnerabilities