Search results for Network Security

    Found 5 documents, 10322 searched:

  • Understanding Deep Convolutional Neural Networks with a practical use-case in Tensorflow and Keras">Silver BlogUnderstanding Deep Convolutional Neural Networks with a practical use-case in Tensorflow and Keras

    ...keras-with-gpu-on-amazon-ec2-a-step-by-step-instruction-4f90364e49ac They should get you started to: Set up an EC2 VM and connect to it Configure the network security to access jupyter notebook remotely 4 - Building a cat/dog classifier using Tensorfow and Keras The environment is now set up. We're...

    https://www.kdnuggets.com/2017/11/understanding-deep-convolutional-neural-networks-tensorflow-keras.html

  • Applying Data Science to Cybersecurity Network Attacks & Events

    ...t the time, I decided I wanted to get into cybersecurity during my undergrad in college. What intrigued me was understanding the concepts of malware, network security, penetration testing & the encryption aspect that really plays a role in what cybersecurity really is. Being able to protect the...

    https://www.kdnuggets.com/2019/09/applying-data-science-cybersecurity-network-attacks-events.html

  • Writing Your First Neural Net in Less Than 30 Lines of Code with Keras

    ...ssentropy', metrics=['accuracy']) I know… I know… it might seem like a lot, but let’s break it down together! We initialize a sequential model called network. network = models.Sequential() And we add our NN layers. For this example, we will be using dense layers. A dense layer simply means that...

    https://www.kdnuggets.com/2019/10/writing-first-neural-net-less-30-lines-code-keras.html

  • Internet of Things Tutorial: WSN and RFID – The Forerunners

    ...algorithms for the mobility of the sensor nodes, functionalities for turning sensor nodes on and off, functionalities for monitoing the status of the network (such as the sensor network configuration), as well as the ever importance authentication and secure data communications functionalities. WSN...

    https://www.kdnuggets.com/2017/01/internet-of-things-tutorial-chapter-2-wsn-rfid-forerunners.html

  • Dissecting the Big Data Twitter Community through a Big data Lens

    …retweets graph is a good representation of actual connections in the network, their strengths, as well as the propagation of information through the network. The Network This post, therefore, will focus on the retweets graph. The following graph shows a visualization of the retweets graph where…

    https://www.kdnuggets.com/2015/09/dissecting-big-data-twitter-community.html

Refine your search here:

Sign Up

By subscribing you accept KDnuggets Privacy Policy