Posted on
in Presentations
Sherlock Holmes would have been proud: advances in AI enable the profiling of hackers based on the specific behavioral and cognitive DNA traces left by the attacker at the crime scene. This series of case studies will build a strong forensic case against individual hackers and see how seemingly unconnected hacks are all done by the same mysterious criminal.
Pre-Requisites: Understanding of fraud fighting principals such as detection vs. FP and alert rate, digital signals (device, location, behavior), link analysis, common attack methods such as Account Takeover, RAT, Bot, Social Engineering
Pre-Requisites: Understanding of fraud fighting principals such as detection vs. FP and alert rate, digital signals (device, location, behavior), link analysis, common attack methods such as Account Takeover, RAT, Bot, Social Engineering
Identity Machine Learning & Artificial Intelligence Anti-Fraud Analytics Intelligence & Response
identity theft fraud big data analytics behavioral analytics artificial intelligence & machine learning
Topic
Identity
Machine Learning & Artificial Intelligence
Anti-Fraud
Analytics Intelligence & Response
Subtopic
identity theft
fraud
big data analytics
behavioral analytics
artificial intelligence & machine learning
Share With Your Community