A Brief Study on the Applications of Deep Learning in the Field of Information Security.

Types of Attacks

Man in middle of attacks
  1. Unsecure connections like public Wi-Fi networks.
DDoS attack
RNN

--

--

--

Java developer and AI learner

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The 6 Categories of Cybersecurity Posture

TronPad Research

#30: Cybersecurity Trends and Emerging Risks (w/ Coalfire Co-Founder Kennet Westby)

Password tips… because not everyone has a retina scanner

Security Testing — SAST, DAST and IAST explained

Controlling Data or Controlled by Data?

“Windows and Linux devices are under attack by a new Crypto-mining worm”

Desktop screen saver of mountainous skyline.

7 Key Points to Include in Your Company’s Cybersecurity Training

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ritesh Sinha

Ritesh Sinha

Java developer and AI learner

More from Medium

ByteBridge Launches 2D-3D Sensor Fusion Labeling Service, Providing Scalable Training Data for…

How are GPUs used for Deep Learning?

Instance segmentation has become one of the most significant, complex and challenging fields in…

Review of Deep Learning Architectures for Image Classification Problem (Part 3)