Ebubekir BüberinDeep Learning TurkeyThe story of Deep LearningDeep learning (also known as deeply structured learning, hierarchical learning or deep machine learning) is a branch of machine learning…5 min read·Feb 15, 2019----
Ebubekir BüberinDeep Learning TurkeyMachine Learning Applications Areas in Daily LifeHere are the some examples of artificial intelligence(ai) and machine learning (ml) applications.9 min read·Jan 11, 2019----
Ebubekir BüberBotnet Detection with MLBotnet means an organized automated army of zombies which can be used for creating a DDoS attack as well as spammy actions of flooding any…11 min read·Mar 23, 2018----
Ebubekir BüberFalse Alarm Rate ReductionIn some cases, IDS / IPS Systems may classify an event correctly or falsely. Classified events are evaluated in four categories in…3 min read·Mar 17, 2018----
Ebubekir BüberActivity Based Verification with MLIdentity theft is a crime in which hackers perpetrate fraudulent activity under stolen identities by using credentials, such as passwords…7 min read·Mar 12, 2018----
Ebubekir BüberBiometric Verification with MLBiometric verifications is an authentication system that uses unique human information. This information has no mirror in the world. It is…4 min read·Mar 12, 2018----
Ebubekir BüberSecure User Authentication with MLAs a dictionary term, Authentication ( or Verification) is independent procedures that are used together for checking that a product…3 min read·Mar 12, 2018----
Ebubekir BüberCaptcha Bypassing with Deep LearningBefore we explain how captcha mechanism can be bypassed, we want to give you a brief introduction about what captcha mechanism is and how…7 min read·Mar 5, 2018----
Ebubekir BüberFraud Detection with MLFraud is one of the ancient things in human history. As there is always people who are fraudulent, there is also people who defrauded. The…3 min read·Feb 28, 2018--1--1
Ebubekir BüberinDeep Learning TurkeyMachine Learning in Cyber SecurityIn recent years, attackers have been developing more sophisticated ways to attack systems. Thus, recognizing these attacks is getting more…2 min read·Feb 25, 2018----