Wat.ai Cybersecurity Team
Subscribe
Sign in
Home
Archive
About
New
Top
Discussion
From GPUs to Raspberry Pi
Downsizing our AI algorithm to detect IoT cyberattacks.
Nov 24
•
Madhav Malhotra
Share this post
From GPUs to Raspberry Pi
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
Classical Machine Learning Algorithms
Zach, YZ, Tian
Nov 17
•
Tian Yao
,
Yen Zein
, and
Zachary Wu
Share this post
Classical Machine Learning Algorithms
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
Jellyfish Everywhere!
Harnessing the power of jellyfish to hunt (for minima)
Nov 14
•
Akira Yoshiyama
Share this post
Jellyfish Everywhere!
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
Density-Based Clustering For the Win!
Comparing three clustering algorithms on high-dimensional data
Nov 2
•
Madhav Malhotra
Share this post
Density-Based Clustering For the Win!
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
October 2023
Understanding Computer Security Fundamentals - The Sign of the Six
Computer security is the holistic practice of safeguarding computer-related assets, encompassing data, hardware, software, communication networks, and…
Oct 29
•
Shreya Arun Naik
1
Share this post
Understanding Computer Security Fundamentals - The Sign of the Six
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
1
Unravelling the Wonders of Particle Swarm Optimization
Exploring Efficiency, Adaptability, and Real-world Applications
Published on Yen’s Substack
•
Oct 23
Fun Graphs with Genetic Algorithms
Explaining the algorithm and some creative visuals :-)
Oct 20
•
Madhav Malhotra
Share this post
Fun Graphs with Genetic Algorithms
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
The Grey Wolf Optimiser
Using wolf hunting behaviour to find features
Oct 14
•
Madhav Malhotra
1
Share this post
The Grey Wolf Optimiser
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
Sparse and Spurious
A Chonky Problem As mentioned in a previous post, we have a CHONKY 14 GB dataset. This is too large to even load into the memory we have available, so…
Oct 10
•
Madhav Malhotra
Share this post
Sparse and Spurious
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
10 Concrete Fixes for Insider Threats
Reality-checking the weakest link in cybersecurity.
Oct 6
•
Madhav Malhotra
Share this post
10 Concrete Fixes for Insider Threats
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
September 2023
The Dark Secret of AI in Cybersecurity
This is why methodology matters.
Sep 29
•
Madhav Malhotra
1
Share this post
The Dark Secret of AI in Cybersecurity
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
Dechonkifying the Data
Our team has been very lucky to benefit from the Canadian Institute for Cybersecurity’s CIC-IoT-2023 dataset. After excitedly loading it onto Kaggle to…
Sep 26
•
Madhav Malhotra
and
Vishnu Mugundan
Share this post
Dechonkifying the Data
wataicyber.substack.com
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts