Skip to content

Machine Learning Engineer

  • Story
  • Guides
  • Portfolio
  • NLP
  • Machine Learning
    • Predictive Analytics
    • Graph Analytics
    • Unsupervised Learning
    • Supervised Learning
    • Ensemble Methods
    • Deep Learning
    • Reinforcement Learning
  • Intelligence
    • Decision Intelligence
    • Threat Intelligence
    • Cognitive Intelligence
    • Financial Intelligence
  • MLOps
    • ML Design
    • ETL
    • EDA
    • Feature Engineering
    • Model Development
    • Model Training
    • Model Deployment
    • Model Monitoring
  • Programming
    • Bash
    • Python
  • Math
  • Resources
NLP

The Cyber Security Future: Machine Learning in Security Training

October 29, 2023October 29, 2023 jbower
Machine Learning Security Training

Cyber security as we know it is dead. This shouldn’t come as a shock to anyone who has been in the industry for a while.

Read More
Graph Networks

ThreatDKG – A Next Gen Graph AI for Cyber Security

October 29, 2023October 29, 2023 jbower
Dynamic Knowledge Graphs

Typical knowledge graphs, which show relationships as interconnected entities are crucial in providing AI systems with the capacity to comprehend and contextualize knowledge. ThreatDKG is

Read More
Quantitative Security

AI-Driven Cyber Security Risk Scoring and Prioritization

October 25, 2023October 25, 2023 jbower
Semantic Search MITRE ATT&CK

When we think about the security of our systems, a lot of it can be compared to a game of chess. Imagine, for a moment,

Read More
UEBA

Combine UEBA And ML To Prevent Supply Chain Attacks Now

October 25, 2023October 25, 2023 jbower

Could Supply Chain Attacks like Log4J have been prevented? If so, how? Well, that’s what I’m going to dive into today, and also announce the

Read More
Decision Intelligence

What is Artificial Decision Intelligence (ADI)?

October 22, 2023October 22, 2023 jbower
Decision Intelligence

What is “Artificial Decision Intelligence?”, and how can it be applied? Artificial Decision Intelligence is made up of the following:

Read More
LLM

An LLM Ensemble for Better Large Language Model Results

September 3, 2023September 8, 2023 jbower

In the ever-evolving world of AI, solving specific problems demands specialized solutions. Firstly, enter the LLM Ensemble: a tailored approach specifically designed to nail complex

Read More
NLP

XGBoost Classifier: The Best for Uncovering DDoS Attacks Easily

September 2, 2023September 2, 2023 jbower

Looking to decode the secret weapon against DDoS threats? Enter the XGBoost Classifier: your beacon in the storm of cyber attacks! Introduction In the expansive

Read More
NLP

Decision Intelligence and Cyber Espionage: Navigating the Digital Shadows Now

August 31, 2023September 1, 2023 jbower

In the digital age, where secrets are coded and hidden in binary, what’s the key to uncovering the truths buried deep within cyberspace? Unraveling the

Read More
Active Defense Decision Intelligence

Building a Next-Gen Active Learning Cyber Defense System

August 22, 2023October 23, 2023 jbower
Decision Intelligence

This post will outline my views on creating an “Active Learning Cyber Defense System.” The type of active learning defense system I am describing can

Read More
LLM

Data Augmentation Using LLMs for Better Phishing Datasets

May 3, 2023August 28, 2023 jbower
Data Augmentation

Can data augmentation elevate your data science status, leaving your peers in awe? Absolutely! Earlier this week, during my day-to-day as an ML Engineer, I

Read More

Posts navigation

1 2 … 5 Next

Categories

  • Active Defense
  • AWS
  • Books
  • Business
  • CTF
  • Decision Intelligence
  • Deep Learning
  • Entity Recognition
  • Graph Networks
  • Health
  • Linux
  • LLM
  • Memory Forensics
  • NIDS
  • NLG
  • NLP
  • Operating Systems
  • Productivity
  • Python
  • Quantitative Security
  • Security Tools
  • Sentiment Analysis
  • Tech
  • Text Analytics
  • Threat Hunting
  • Threat Intelligence
  • Topic Modeling
  • UEBA
  • Twitter
  • GitHub
  • YouTube
  • LinkedIn

Videos

https://www.youtube.com/watch?v=FEb8KZoEyzI&t=1291s

Recent Posts

  • The Cyber Security Future: Machine Learning in Security Training
  • ThreatDKG – A Next Gen Graph AI for Cyber Security
  • AI-Driven Cyber Security Risk Scoring and Prioritization
  • Combine UEBA And ML To Prevent Supply Chain Attacks Now
  • What is Artificial Decision Intelligence (ADI)?

Tags

Apache BERT Boot2Root classification Conda Data Augmentation ddos Diet Dirb Ensemble featured Firewall FreeBSD GPT-3 Hacking Hacking Challenge Htop Kioptrix LiME LLM Miniconda Mod_jk Monitoring NetworkMiner Nikto NLP NLTK Nmap Nokia 770 OpenAI OpenBSD PCAP pdfminer Peak Performance PF Productivity recon Security SSM Tomcat Visualize VSCode Word2Vec Workout xgboost

Archives

  • October 2023
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • February 2023
  • March 2020
  • June 2019
  • July 2018
  • May 2018
  • August 2017
  • June 2017
  • February 2017
  • November 2016
  • October 2016
  • September 2016
  • April 2016
  • March 2016
  • November 2015
  • August 2015
  • September 2014
  • August 2014
  • July 2014
  • January 2014
  • June 2013
  • January 2012
  • September 2009
  • August 2009
  • September 2008
  • September 2006
Bower Enterprises All Rights Reserved 2023.
Proudly powered by WordPress | Theme: Fairy Blog by Candid Themes.