About 80% of the work that goes into machine learning based cyber attack detection is focused on feature engineering – identifying what values to extract from binaries, network packets, and other signals to use as inputs to our machine learning systems (see, for example, my previous blog post on using the PE compile timestamp in […]
from Look Ma, No Features!: Deep Learning Methods in Intrusion Detection
No comments:
Post a Comment