-
Example: https://mila.quebec/en/publications/
It would be nice to reuse the same code as in the Mila website. Not sure if that's 'easily' possible via RTD
-
Original release date: August 4, 2022
### Summary
**Immediate Actions You Can Take Now to Protect Against Malware:**
• Patch all systems and prioritize patching [known exploited vulnerabilities](…
-
Currently we don't have classification algorithms in `ml-commons`. We can start support classification by adding LogisticRegression.
-
### Topic Suggestion
Fighting cybersecurity threats with big data
#### Pre-submission advice
There are three main challenges businesses are running into with big data protecting sensitive and p…
-
For over one year, DataBreaches.net has highlighted some breaches of ASEAN victims by groups such as ALTDOS and DESORDEN. In addition to those two groups, there are also numerous other leaks and br…
-
Original release date: August 11, 2022
### Summary
**Actions to take today to mitigate cyber threats from ransomware:**
• Prioritize remediating [known exploited vulnerabilities](https://www.cisa…
-
## Description
It seems that since a recent update of our OpenCTI platforms the x_opencti_cti attributes doesn't work anymore.
## Environment
1. OS (where OpenCTI server runs): Ubuntu 20.04
…
-
### Problem description
[Docker for Mac](https://store.docker.com/editions/community/docker-ce-desktop-mac) and [Docker for Windows](https://store.docker.com/editions/community/docker-ce-desktop-wi…
-
**Original article:** Wissam Aoudi, Mikel Iturbe, and Magnus Almgren. 2018. Truth Will Out:
Departure-Based Process-Level Detection of Stealthy Attacks on Control
Systems. In 2018 ACM SIGSAC Confere…
-