November 27, 2018 | Renaissance Dallas Hotel

https://www.evanta.com/ciso/summits/dallas/1676#overview

Using Deep Learning for Information Security – Part 2

Using Deep Learning for Information Security – Part 2

Authors: Santosh Kosgi, Mohammad Waseem, Arunabha Choudhury, and Satnam Singh Deep Learning-based methods have been successfully applied to various computer vision and NLP based problems recently [1]. AI researchers have achieved statistically significant improvements...

Trademarks

Trademarks owned by Acalvio Technologies, Inc. The trademarks and service marks identified in the following list are the exclusive properties of Acalvio Technologies, Inc. or its affiliates (collectively, “Acalvio”). These marks are registered with the U.S. Patent and...