Malicious ai

Antivirus AI - Virus Cleaner v2.0.1  Software

Posted by at Jan. 3, 2024
Antivirus AI - Virus Cleaner v2.0.1

Antivirus AI - Virus Cleaner v2.0.1 | Android | 8.96 MB
Unlocked version

Best Antivirus AI Android - Virus Scanner & Anti Malware Scan
Dark AI, Deepfake and AGI : Navigating the Shadows: Unraveling Dark AI, Deepfakes, and the Rise of AGI

Dark AI, Deepfake and AGI : Navigating the Shadows: Unraveling Dark AI, Deepfakes, and the Rise of AGI by Et Tu Code
English | February 29, 2024 | ISBN: N/A | ASIN: B0CWT4CRZ4 | 436 pages | EPUB | 40 Mb

Using Generative AI to Secure the Network  eBooks & eLearning

Posted by at June 4, 2024
Using Generative AI to Secure the Network

Using Generative AI to Secure the Network
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 21m | 189 MB
Instructor: Lisa Bock
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection

AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection by Francesco Bergadano andGiorgio Giacinto
English | PDF | 2023 | 210 Pages | ISBN : 3036582649 | 11.3 MB

Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and multilevel authentication, complex application and network monitoring, and anomaly detection. We refer to this as the "anomaly detection continuum". Machine learning and other artificial intelligence technologies can provide powerful tools for addressing such issues, but the robustness of the obtained models is often ignored or underestimated. On the one hand, AI-based algorithms can be replicated by malicious opponents, and attacks can be devised so that they will not be detected (evasion attacks). On the other hand, data and system contexts can be modified by attackers to influence the countermeasures obtained from machine learning and render them ineffective (active data poisoning). This Special Issue presents ten papers that can be grouped under five main topics: (1) Cyber-Physical Systems (CPSs), (2) Intrusion Detection, (3) Malware Analysis, (4) Access Control, and (5) Threat intelligence.

Mastering Ai Security  eBooks & eLearning

Posted by at Sept. 17, 2024
Mastering Ai Security

Mastering Ai Security
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 912.46 MB | Duration: 1h 51m

A Comprehensive Guide to AI Security

Ai-Driven Hacking Pentesting Chatgpt & Tgpt Dark Mode Gen-Ai  eBooks & eLearning

Posted by at Dec. 12, 2024
Ai-Driven Hacking Pentesting Chatgpt & Tgpt Dark Mode Gen-Ai

Ai-Driven Hacking Pentesting Chatgpt & Tgpt Dark Mode Gen-Ai
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 576.90 MB | Duration: 4h 53m

Master AI-driven Gen-Ai Based PenTesting, Hacking with ChatGPT and TGPT, Vulnerability Analysis, Exploitation, and More.

Agentic Ai - Risk And Cybersecurity Masterclass 2025  eBooks & eLearning

Posted by at March 20, 2025
Agentic Ai - Risk And Cybersecurity Masterclass 2025

Agentic Ai - Risk And Cybersecurity Masterclass 2025
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.21 GB | Duration: 3h 5m

Learn the Cyber security risks around AI Agents and Agentic AI and how to mitigate them

Ethical Hacking against and with AI/LLM/ML Training Course  eBooks & eLearning

Posted by at March 29, 2024
Ethical Hacking against and with AI/LLM/ML Training Course

Ethical Hacking against and with AI/LLM/ML Training Course
Published 3/2024
Duration: 3h24m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.74 GB
Genre: eLearning | Language: English

Become professional in AI and LLM Penetration Testing and Vulnerability Discovery

Malicious Deceivers: Thinking Machines and Performative Objects  eBooks & eLearning

Posted by at Oct. 22, 2023
Malicious Deceivers: Thinking Machines and Performative Objects

Ioana B. Jucan, "Malicious Deceivers: Thinking Machines and Performative Objects "
English | ISBN: 1503636070 | 2023 | 324 pages | PDF | 44 MB

Malicious Deceivers: Thinking Machines and Performative Objects  eBooks & eLearning

Posted by at May 19, 2024
Malicious Deceivers: Thinking Machines and Performative Objects

Ioana B. Jucan, "Malicious Deceivers: Thinking Machines and Performative Objects "
English | ISBN: 1503636070 | 2023 | 324 pages | EPUB | 14 MB