“In the case of malware detection, for example, cyberdefenses have traditionally focused on signature recognition of code that has been detected in precious malware attacks or on heuristics that define a set of rules based on past malware behavior”
Cybersecurity Protection Increasingly Depends on Machine Learning
Using machine learning to protect the proliferating landscape of IoT and edge devices will ultimately rely on a distributed network model that applies intelligence at different tiers, based on cost, bandwidth and availability.
In this report, explore the capabilities of machine learning for cybersecurity tasks. Find out more about:
How machine learning algorithms can infer relationships and patterns of previously unseen activity to recognize network activity that indicates pending attacks.
Is it possible to secure IoT devices without spending on additional infrastructure or upsetting the already established IT status quo?
Periodically, IoT World Today will inform you of special events, products and other offers that we believe you will find helpful in your business or career. To STOP receiving promotional e-mails from IoT World Today, please click here.
IoT World Today | Informa | 605 Third Avenue, 22nd Floor, New York, NY 10158 | Privacy Policy