×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of alex-pinto
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
6.938 views
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci)
1.118 views
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling Indicators
1.640 views
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
20 views
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#SecureBecauseMath)
5.870 views
ALEX PINTO WELDER
101 views
Alex's Resume
35 views
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Effectiveness
390 views
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
1.544 views
Towards a Threat Hunting Automation Maturity Model
1.181 views