Home
Search results “Cryptographically private support vector machines classification”
Blockchain Consensus Algorithms and Artificial Intelligence
 
31:17
Is blockchain + AI a winning combo? Yes! They are complementary technologies, and knowing how both work will make you a much more powerful developer. Artificial Intelligence can use the power of the blockchain to audit data, add incentives to its goals, and even create new types of meritocratic organizations. In this video, i'll talk about how they can both work together, code out the proof of work algorithm in python, then talk about a few other consensus algorithms at a high level. Code for this video: https://github.com/llSourcell/blockchain_consensus Please Subscribe! And like. And comment. That's what keeps me going. Follow me: Twitter: https://twitter.com/sirajraval Facebook: https://www.facebook.com/sirajology More Learning Resources: https://blog.bigchaindb.com/blockchains-for-artificial-intelligence-ec63b0284984 https://www.topbots.com/combination-ai-blockchain-revolutionize-10-industries/ https://blog.oceanprotocol.com/from-ai-to-blockchain-to-data-meet-ocean-f210ff460465 https://www.slideshare.net/bicalabs/artificial-intelligence-blockchain-synergy https://blog.ethereum.org/2014/05/06/daos-dacs-das-and-more-an-incomplete-terminology-guide/ https://bitcoinmagazine.com/articles/bootstrapping-a-decentralized-autonomous-corporation-part-i-1379644274/ https://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/ Join us in the Wizards Slack channel: http://wizards.herokuapp.com/ And please support me on Patreon: https://www.patreon.com/user?u=3191693 Instagram: https://www.instagram.com/sirajraval/ Instagram: https://www.instagram.com/sirajraval/
Views: 40095 Siraj Raval
Crypto Defenses for Real-World System Threats - Kenn White - Ann Arbor
 
01:36:58
Modern encryption techniques provide several important security properties, well known to most practitioners. Or are they? What are in fact the guarantees of, say, HTTPS TLS cipher suites using authenticated encryption, IPSec vs. SSL VPNs, Property Preserving Encryption, or token vaults? We live in an era of embedded Hardware Security Modules that cost less than $1 in volume, and countless options now exist for encrypting streaming network data, files, volumes, and even entire databases. Let's take a deep dive into the edge of developed practice to discuss real-world threat scenarios to public cloud and IoT data, and look closely at how we can address specific technical risks with our current encryption toolkits. Advanced math not required. Bio: Kenneth White is a security researcher whose work focuses on networks and global systems. He is co-director of the Open Crypto Audit Project (OCAP), currently managing a large-scale audit of OpenSSL on behalf of the Linux Foundation's Core Infrastructure Initiative. Previously, White was Principal Scientist at Washington DC-based Social & Scientific Systems where he led the engineering team that designed and ran global operations and security for the largest clinical trial network in the world, with research centers in over 100 countries. White co-founded CBX Group which provides security services to major organizations including World Health, UNICEF, Doctors without Borders, the US State Department, and BAO Systems. Together with Matthew Green, White co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. White holds a Masters from Harvard and is a PhD candidate in neuroscience and cognitive science, with applied research in real-time classification and machine learning. His work on network security and forensics and been cited by media including the Wall Street Journal, Forbes, Reuters, Wired and Nature. White is a technical reviewer for the Software Engineering Institute, and publishes and speaks frequently on computational modeling, security engineering, and trust. He tweets @kennwhite.
Views: 819 Duo Security
Phishing URL Detection Using Machine Learning.
 
03:37
Detecting phishing URLs with Machine Learning. This video show a Demonstration of Phishing URL Detection Project.
Views: 69 Arinze Ugwuanyi
DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel
 
41:17
Secure Channel (Schannel) is Microsoft's standard SSL/TLS Library underpinning services like RDP, Outlook, Internet Explorer, Windows Update, SQL Server, LDAPS, Skype and many third party applications. Schannel has been the subject of scrutiny in the past several years from an external perspective due to reported vulnerabilities, including a RCE. What about the internals? How does Schannel guard its secrets? This talk looks at how Schannel leverages Microsoft's CryptoAPI-NG (CNG) to cache the master keys, session keys, private and ephemeral keys, and session tickets used in TLS/SSL connections. It discusses the underlying data structures, and how to extract both the keys and other useful information that provides forensic context about connection. This information is then leveraged to decrypt session that use ephemeral cipher suites, which don't rely on the private key for decryption. Information in the cache lives for at least 10 hours by default on modern configurations, storing up to 20,000 entries for client and server each. This makes it forensically relevant in cases where other evidence of connection may have dissipated. Bio: Jake Kambic is a DFIR researcher and network penetration tester
Views: 1294 DEFCONConference
The Ethics and Governance of AI opening event, February 3, 2018
 
03:57:07
Chapter 1: 0:04 - Joi Ito Chapter 2: 1:03:27 - Jonathan Zittrain Chapter 3: 2:32:59 - Panel 1: Joi Ito moderates a panel with Pratik Shah, Karthik Dinakar, and Vikash Mansinghka Chapter 4: 3:19:13 - Panel 2: Joi Ito moderades a panel with Kade Crockford (ACLU), Chris Bavitz (), and Adam Foss() discuss the implications of AI for social and criminal justice. More information at: https://www.media.mit.edu/courses/the-ethics-and-governance-of-artificial-intelligence/ License: CC-BY-4.0 (https://creativecommons.org/licenses/by-nc/4.0/)
Views: 3901 MIT Media Lab
A cloud networking blueprint for securing your workloads (Google Cloud Next '17)
 
58:46
Securing your workloads in the cloud requires shifting away from the traditional “perimeter” security to a “pervasive, hierarchical, scalable” security model. In this video, Prajakta Joshi, Subbaiah Venkata, and Jigar Shah discuss cloud networking best practices for securing enterprise and cloud-native workloads on Google Cloud Platform. They describe a network security blueprint that covers securing your virtual networks (VPCs), DDoS protection, using third-party security appliances and services, and visibility and analytics for your deployments. They also highlight Google’s experiences in delivering its own services securely and future trends in cloud network security. Missed the conference? Watch all the talks here: https://goo.gl/c1Vs3h Watch more talks about Infrastructure & Operations here: https://goo.gl/k2LOYG
Views: 4892 Google Cloud Platform
DEF CON 22 - Kenneth White and Matthew Green - The Open Crypto Audit Project
 
51:16
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/White-Green/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf The Open Crypto Audit Project Kenneth White CO-FOUNDER, OPEN CRYPTO AUDIT PROJECT Matthew Green RESEARCH PROFESSOR, JOHNS HOPKINS UNIVERSITY Join us for the story of the origins and history of the Open Crypto Audit Project (OCAP). OCAP is a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of the widely used encryption software TrueCrypt®. Our charter is to provide technical assistance to free and open source software projects in the public interest. We serve primarily as a coordinator for volunteers and as a funding mechanism for technical experts in security, software engineering, and cryptography. We conduct analysis and research on FOSS and other widely software, and provide highly specialized technical assistance, analysis and research on free and open source software. This talk will present how we audited TrueCrypt, detailing both the Phase I security assessment, and the Phase II cryptanalysis. Looking forward, in light of GotoFail and HeartBleed, we will discuss future plans for our next audit projects of other open source critical infrastructure. Kenneth White is a co-founder of the CBX Group, and formerly principal scientist and senior security R&D engineer at Social & Scientific Systems. His work focuses on cloud security, machine learning, and distributed database architecture. At SSS, White led the Biomedical Informatics team that designed and runs the operations center for the largest clinical trial network in the world, with research centers in over 100 countries. Together with Matthew Green, White co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. White holds a MEd from Harvard and is a PhD candidate in neuroscience and cognitive science, with research focusing on expert systems, real-time classification and machine learning. He is a technical reviewer for the Software Engineering Institute, and publishes and speaks frequently on computational neuroscience, signal processing, and security engineering. Twitter: @kennwhite Matthew D. Green, PhD is a professor of computer science at Johns Hopkins University. He teaches applied cryptography and builds secure systems. Green trained under Susan Hohenberger and Avi Rubin, and his research includes techniques for privacy-enhanced information storage, anonymous payment systems, and bilinear map-based cryptography. Green formerly served as a senior research staff member at AT&T Labs. Together with Kenneth White, he co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. He blogs at Cryptography Engineering, and talks about cryptography and privacy. Twitter: @matthew_d_green Web: https://opencryptoaudit.org/people
Views: 3393 DEFCONConference
SIMD
 
17:29
Single instruction, multiple data (SIMD), is a class of parallel computers in Flynn's taxonomy. It describes computers with multiple processing elements that perform the same operation on multiple data points simultaneously. Thus, such machines exploit data level parallelism, but not concurrency: there are simultaneous (parallel) computations, but only a single process (instruction) at a given moment. SIMD is particularly applicable to common tasks like adjusting the contrast in a digital image or adjusting the volume of digital audio. Most modern CPU designs include SIMD instructions in order to improve the performance of multimedia use. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 7173 Audiopedia
15. Medical Software
 
01:15:31
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Kevin Fu In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 3846 MIT OpenCourseWare
Livestream Day 3: Stage 1 (Google I/O '18)
 
07:53:52
This livestream covers all of the Google I/O 2018 day 3 sessions that take place on Stage 1. Stay tuned for technical sessions and deep dives into Google's latest developer products and platforms. Event schedule (all times are PDT) → https://goo.gl/x5ENpG 23:12 - Navigation 1:19:15 - What's new in Android security 2:17:35 - Personalize Actions for the Google Assistant 3:16:31 - Intro to machine learning on Google Cloud Platform 5:16:25 - What's new with ConstraintLayout and Android Studio design tools 6:16:46 - Android Jetpack: manage infinite lists with RecyclerView and Paging 7:16:20 - Distributed TensorFlow training Google I/O 2018 All Sessions playlist → https://goo.gl/q1Tr8x Subscribe to the Google Developers channel → http://goo.gl/mQyv5L Music by Terra Monk → https://goo.gl/wPgbHP
Views: 14651 Google Developers
Callouts Tutorial for Final Cut Pro X
 
11:00
http://www.rippletraining.com/categories/templates-and-transitions/c/callouts-for-final-cut-pro-x.html Add animated arrows, shapes and magnifiers in Final Cut Pro. Available exclusively for Final Cut Pro X. FxFactory powers hundreds Effects for Final Cut Pro, Motion and After Effects: http://www.noiseindustries.com/fxfactory/
Vinton G. Cerf: Cybersecurity
 
01:29:00
Vinton G. Cerf, vice president and chief Internet evangelist at Google, addresses CISAC's 2014 Drell Lecture. The Stanford graduate and co-founder of the architecture of the Internet tells the audience that cybersecurity is a shared responsibility among private industry and governments worldwide.
Views: 1984 CISAC Stanford
The Data and Application Security and Privacy (DASPY) Challenge
 
01:05:28
SPEAKER & AFFILIATION: Ravi Sandhu, University of Texas at San Antonio DESCRIPTION & LINK: This lecture has been videocast from the Computer Science Department at NCSU. The abstract of this lecture and a brief speaker biography is available at http://research.csc.ncsu.edu/colloquia/seminar-post.php?id=413. For a complete transcript of this lecture, go to http://www.ncsu.edu/youtube/transcript/sandhu-transcript.doc.
Views: 708 NCState
Danger of Prolific Cybercrime and Network DDOS from Unprotected IoT Devices
 
01:51:12
Live from Syracuse University's Center of Excellence (SyracuseCoE), this webinar featured a presentation by Scott Wu, chief executive officer of NewSky Security and Richard Yim, vice president of product management with People Power Company. Wu and Yim discussed emerging threats due to the proliferation of the Internet of Things (IoT) landscape and connected devices in the home, offices, and major industrial centers. Associate Director of Research at SyracuseCoE Chetna Chianese introduced the webinar with an overview of the SyracuseCoE.
Views: 166 NREL Learning
PhDs at Google: Privacy and Security
 
33:32
Watch our video to see how PhDs contribute to Google's Privacy and Security development. Apply for our summer internship for PhDs in software engineering — the deadline is January 31, so apply now at g.co/phdintern! To see all of our opportunities, visit https://g.co/studentcareers **Please note this was a YouTube live event, so some features are disabled for this published video**
Views: 911 Google Students
Lessons learned from securing both Google and Google Cloud customers (Google Cloud Next '17)
 
37:09
Every second, billions of people are using Google Cloud to conduct business — communicating via Gmail, storing docs in Drive, hosting, executing code, in Google Cloud Platform to build new products and companies. This provides Google with unique insight into the evolution of cybersecurity threats at every level around the world. In this talk, Andy Chang draws back the curtain on how Google creates a platform for trust that millions of businesses around the world rely on daily. He provides insight into: the multiple layers of Google security; its 650-member strong Security and Privacy Team; and the lessons learned preventing, detecting and responding to cyber attacks against Google and Google Cloud customers. Missed the conference? Watch all the talks here: https://goo.gl/c1Vs3h Watch more talks about Infrastructure & Operations here: https://goo.gl/k2LOYG
Views: 1199 Google Cloud Platform
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
 
01:08
To get this project in ONLINE or through TRAINING Sessions, Contact: JP INFOTECH, 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY-9 Landmark: Opposite to Thattanchavady Industrial Estate, Next to VVP Nagar Arch. Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org Blog: www.jpinfotech.blogspot.com Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two test beds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Views: 282 jpinfotechprojects
Google I/O 2016 - Day 1 Track 3
 
06:57:52
For Captions: https://youtu.be/YqXq0wbI9wo
Views: 29854 Google Developers
2018 Sentinel Initiative Annual Public Workshop
 
07:52:15
This annual workshop serves as a forum to bring together leading experts and interested stakeholders to discuss the ongoing development of the Sentinel Initiative. The Food and Drug Administration Amendments Act of 2007 authorized the Sentinel Initiative with the charge of utilizing electronic health care data for post market risk identification and analysis of medical product safety.
Views: 1664 Duke Margolis
Edward Snowden Q&A at IETF93 (Snowden Stream Isolated and Stabilised, Audio Enhanced, Captioned)
 
56:02
Edward Snowden answers questions from IETF attendees after a showing of CITIZENFOUR. Recorded at IETF93, 19 July 2015. Enhanced by Justin Lynn; licensed under CC0. Recording by Benson Schliesser; licensed as CC0. Original at https://www.youtube.com/watch?v=0NvsUXBCeVA Transcript from https://gist.github.com/mnot/382aca0b23b6bf082116
Views: 327 Justin Lynn
Livestream Day 3: Stage 2 (Google I/O '18)
 
07:51:52
This livestream covers all of the Google I/O 2018 day 3 sessions that take place on Stage 2. Stay tuned for technical sessions and deep dives into Google's latest developer products and platforms. Event schedule (all times are PDT) → https://goo.gl/x5ENpG 25:57 - Deliver search-friendly JavaScript-powered websites 1:23:19 - The future of computing: a conversation with John Hennessy 2:21:47 - Android Jetpack: sweetening Kotlin development with Android KTX 3:20:46 - TensorFlow and deep reinforcement learning, without a PhD 4:20:53 - Improve app performance with Android Studio Profilers 6:21:02 - Migrate your existing app to target Android Oreo and above 7:20:56 - Build engaging conversations for the Google Assistant with DialogFlow Google I/O 2018 All Sessions playlist → https://goo.gl/q1Tr8x Subscribe to the Google Developers channel → http://goo.gl/mQyv5L Music by Terra Monk → https://goo.gl/wPgbHP
Views: 11512 Google Developers
PlayStation Presents - PSX 2017 Opening Celebration | English CC
 
03:03:39
Join us as we kick off PSX 2017 with PlayStation Presents, starting at 8 PM Pacific on Friday December 8th. Listen in on candid discussions with some of PlayStation’s top developers, get the latest on some of the biggest games coming in 2018, and be the first to witness some special announcements.
Views: 308717 PlayStation