- Видео 46
- Просмотров 3 419
AI School Oxford | DR PETAR RADANLIEV
Великобритания
Добавлен 31 дек 2023
AI Security Oxford is a RUclips channel dedicated to exploring the intersection of Artificial Intelligence (AI), Cybersecurity, and Blockchain Technology.
I am a seasoned Post-Doctoral Research Associate at the University of Oxford. My content is informed by years of rigorous academic research and professional experience, offering viewers an unmatched depth of knowledge.
AI Security Oxford is the perfect destination for anyone seeking a deep, nuanced understanding of AI and cybersecurity. Whether you're beginning your academic journey or are a seasoned professional, my channel offers a wealth of knowledge and insights.
Subscribe to AI Security Oxford for your weekly dose of expert analysis and deep dives into the dynamic world of AI and Cybersecurity. Let's embark on this journey of discovery together.
I am a seasoned Post-Doctoral Research Associate at the University of Oxford. My content is informed by years of rigorous academic research and professional experience, offering viewers an unmatched depth of knowledge.
AI Security Oxford is the perfect destination for anyone seeking a deep, nuanced understanding of AI and cybersecurity. Whether you're beginning your academic journey or are a seasoned professional, my channel offers a wealth of knowledge and insights.
Subscribe to AI Security Oxford for your weekly dose of expert analysis and deep dives into the dynamic world of AI and Cybersecurity. Let's embark on this journey of discovery together.
Cape Sandbox: AI-Malware Analysis
#Polymorphicmalware #Polymorphic #malwareanalysis #aisecurity
Link to part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/
Link to part 2 of the tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/
Link to part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/
Link to part 2 of the tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/
Просмотров: 12
Видео
Interview Questions: Quiz on Malware Analysis
Просмотров 52 часа назад
Cybersecurity Career Path #Polymorphicmalware #Polymorphic #malwareanalysis #aisecurity Link to part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/ Link to part 2 of the tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/
Ghidra Demo: Reverse Engineer AI Polymorphic Malware
Просмотров 2584 часа назад
#Polymorphicmalware #Polymorphic #malwareanalysis #aisecurity Link to part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/ Link to part 2 of the tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/
AI Based Static Malware Analysis
Просмотров 304 часа назад
#Polymorphicmalware #Polymorphic #malwareanalysis #aisecurity Link to part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/ Link to part 2 of the tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/
AI Malware Analysis: Types of Malware
Просмотров 464 часа назад
#Polymorphicmalware #Polymorphic #malwareanalysis #aisecurity Link to part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/ Link to part 2 of the tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/
Behavioural Analysis with Falcon X AI: Analyzing advanced malware strains in cloud environments.
Просмотров 2712 часов назад
#Polymorphicmalware #Polymorphic #malwareanalysis #aisecurity Link to the part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/ Link to the part 2 of the full tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/ Falcon X AI (Cosive): Employs AI models to enhance malware analysis by observing the ...
Wireshark for AI Malware Analysis and Improved Threat Detection
Просмотров 22314 часов назад
Link to the part 1 of the tutorial (4hrs): www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/ Link to the part 2 of the full tutorial (4hrs): www.oreilly.com/live-events/quantum-ai-and-cybersecurity/0642572013118/ Wireshark is one of the most widely used open-source network protocol analyzers, designed to capture and interactively inspect network traffic in r...
Introduction to Malware Analysis
Просмотров 10016 часов назад
Definition of Malware: Malware (malicious software) refers to any software intentionally designed to cause damage to a computer, server, client, or network. Malware can disrupt operations, steal sensitive data, or control systems.
Bayesian Optimisation for AI Malware Analysis and Improved Threat Detection
Просмотров 23816 часов назад
Bayesian optimisation is a statistical approach employed for optimising complex and computationally expensive functions, making it highly relevant for AI-driven malware analysis and threat detection. It works by building a probabilistic model of the objective function and using this model to identify the most promising areas to evaluate next. This methodology is particularly useful in scenarios...
Static analysis with Snyk and DeepCode AI: Reverse-engineering polymorphic AI malware
Просмотров 5419 часов назад
DeepCode AI is a tool that integrates machine learning with symbolic reasoning to detect vulnerabilities, malicious patterns, and logical inconsistencies in code. This video will show you the AI models used by the product, the databases, and all else that you need to know, without reading through their online guidance documents. This video is not paid or promoted by the company selling this pro...
AI-Based Malware Analysis for Cybersecurity
Просмотров 38День назад
Exercise/Activity: Static analysis with DeepCode AI: Reverse-engineering polymorphic AI malware Link to the full 4hrs tutorial: www.oreilly.com/live-events/ai-based-malware-analysis-for-cybersecurity/0642572011793/?_gl=1*15sd2re*_gcl_au*NjgzNTU3MjQuMTczNDk4ODEyNw..*_ga*MTI3ODMxMTI4Ni4xNzMyMDE0MzQ5*_ga_092EL089CH*MTczNDk4ODEyNS42LjEuMTczNDk4ODEzNi40OS4wLjA
Black Mamba Polymorphic Malware
Просмотров 190День назад
BlackMamba is an advanced proof-of-concept malware that demonstrates the disruptive potential of AI-driven cyberattacks. Designed to evade traditional detection systems, BlackMamba uses generative AI models to dynamically adapt its behaviour, creating a unique and evolving threat profile. This case study examines how BlackMamba operates, the vulnerabilities it exploits, and the implications it ...
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Просмотров 264 месяца назад
Reference: Santos, O., & Radanliev, P. (2023). Beyond the Algorithm: AI, Security, Privacy, and Ethics (C. Maple & U. Ani, Eds.; 1st ed.). Pearson. www.informit.com/store/beyond-the-algorithm-ai-security-privacy-and-ethics-9780138268459
Ethics and responsible AI deployment
Просмотров 174 месяца назад
Link to the article: doi.org/10.3389/frai.2024.1377011 Reference: Radanliev, P., Santos, O., Brandon-Jones, A., & Joinson, A. (2024). Ethics and responsible AI deployment. Frontiers in Artificial Intelligence, 7, 1377011. doi.org/10.3389/FRAI.2024.1377011
Artificial intelligence Evolution: Key Milestones and What's Next
Просмотров 1284 месяца назад
Article Title: Artificial intelligence: reflecting on the past and looking towards the next paradigm shift Link: www.tandfonline.com/doi/full/10.1080/0952813X.2024.2323042#abstract Cite this article Radanliev, P. (2024). Artificial intelligence: reflecting on the past and looking towards the next paradigm shift. Journal of Experimental & Theoretical Artificial Intelligence, 1-18. doi.org/10.108...
Cyber diplomacy: opportunities and risks from AI, Blockchains, and Quantum Computing
Просмотров 1064 месяца назад
Cyber diplomacy: opportunities and risks from AI, Blockchains, and Quantum Computing
Enhancing AI Security with CHERI and AI BOM
Просмотров 834 месяца назад
Enhancing AI Security with CHERI and AI BOM
Integrating CHERI with the Artificial Intelligence Bill of Materials (AI BOM)
Просмотров 535 месяцев назад
Integrating CHERI with the Artificial Intelligence Bill of Materials (AI BOM)
Artificial intelligence and quantum cryptography
Просмотров 785 месяцев назад
Artificial intelligence and quantum cryptography
Integrated cybersecurity for metaverse systems, AI, blockchains, and cloud computing
Просмотров 165 месяцев назад
Integrated cybersecurity for metaverse systems, AI, blockchains, and cloud computing
Module 1 - Lesson 8: Human-in-the-loop Systems
Просмотров 2910 месяцев назад
Module 1 - Lesson 8: Human-in-the-loop Systems
Module 1 - Lesson 7: Transparency and Documentation
Просмотров 1410 месяцев назад
Module 1 - Lesson 7: Transparency and Documentation
Module 1 - Lesson 6: Techniques for Bias Detection and Mitigation
Просмотров 5110 месяцев назад
Module 1 - Lesson 6: Techniques for Bias Detection and Mitigation
Module 1 - Lesson 4: Model Agnostic Methods
Просмотров 4810 месяцев назад
Module 1 - Lesson 4: Model Agnostic Methods
Module 1 - Lesson 3: Rule based Systems
Просмотров 2010 месяцев назад
Module 1 - Lesson 3: Rule based Systems
Module 1 - Lesson 2: Cutting-edge Applications in Decision Trees
Просмотров 3410 месяцев назад
Module 1 - Lesson 2: Cutting-edge Applications in Decision Trees
Module 1 - Lesson 1: Advanced Projects in Linear Models
Просмотров 6810 месяцев назад
Module 1 - Lesson 1: Advanced Projects in Linear Models
Who will win the race to dominate AI? China's Race for AI Supremacy.
Просмотров 3311 месяцев назад
Who will win the race to dominate AI? China's Race for AI Supremacy.
8pm is early
muito bacana
Thanks! You explain so well
Thank you for your work and providing free knowledge on the internet. You came across as a genuine and knowledgeable tutor, I'll surely follow your work.
Thank you so much for this I am trying to build something like snyk for a hackathon. 11:20 ; Do you think open source llms can be used for finetuning. Open source models have improved. I was looking at DeepSeekCoder V2 You have gained a subscriber
"Scalability is crucial for large enterprises. SmythOS is designed to scale effortlessly with your business, handling increased workloads and expanding operations without compromising performance."
hello petar
hello Janko :)
@@AISchoolOxford I am doing masters in smart cities and I would like to get in touch with you.
Thank you Dr Petar. As a mum who's been diving into blockchain and AI tech, I agree that more women will start to use the technology for its simplicity. Looking forward to more of your videos. New subscriber!
Thank you for the information.
"Our greatest fear should not be of failure but of succeeding at things in life that don't really matter." *Francis Chan
Well. Here is the thing.