Firenze
Hidden Hot Battle Lessons of Cold War: All Learning Models Have Flaws, Some Have Casualties
Deep Learning Neural Networks – Our Fun Attempt At Building One
Your model isn't that special: zero to malware model in Not Much Code and where the real work lies
Getting insight out of and back into deep neural networks
Transfer Learning: Analyst-Sourcing Behavioral Classification
The Human Factor: Why Are We So Bad at Security and Risk Assessment?
Behavioral Analysis from DNS and Network Traffic
Sympathy for the Developer
The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software
Mining Software Vulns in SCCM / NIST’s NVD– The Rocky Road to Data Nirvana
Building a Benign Data Set
A System Dynamics Approach to CNO Modelling
The Role of Data Visualization in Improving Machine Learning Models
Data visualization in security: Still home of the WOPR?
Exploration of Novel Visualizations for Information Security Data
Magical Thinking... and how to thwart it.
Is Data Visualization still necessary?
Grappling Hooks on the Ivory Tower: This Year in Practical Academic Research
How to make metrics and influence people