Feb. 17, 2022, 8:20 a.m. | Thomas Davies

cs.CR updates on arXiv.org arxiv.org

In cybersecurity it is often the case that malicious or anomalous activity
can only be detected by combining many weak indicators of compromise, any one
of which may not raise suspicion when taken alone. The path that such
indicators take can also be critical. This makes the problem of analysing
cybersecurity data particularly well suited to Topological Data Analysis (TDA),
a field that studies the high level structure of data using techniques from
algebraic topology, both for exploratory analysis and …

analysis cybersecurity data data analysis review

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Architect - Hardware

@ Intel | IND - Bengaluru

Elastic Consultant

@ Elastic | Spain

OT Cybersecurity Specialist

@ Emerson | Abu Dhabi, United Arab Emirates

Security Operations Program Manager

@ Kaseya | Miami, Florida, United States

Senior Security Operations Engineer

@ Revinate | Vancouver