James CoffeyRecap: Constructing an End-to-End ML Pipeline for Malware DetectionWelcome back! Today we wrap up our series on crafting a full-fledged machine learning (ML) pathway for spotting pesky malware. We’ve…May 2May 2
James CoffeyOrchestration and Automation with Managed Apache Airflow (MWAA)Welcome back to the third part of our series on “Building an End-to-End ML Pipeline for Malware Detection.” In the previous two posts, we…May 1May 1
James CoffeyModel Training and Management with MLflow and Amazon SageMakerHey there! Welcome back to our “Building an End-to-End ML Pipeline for Malware Detection” blog series. Last time, in “Data Wrangling with…Apr 29Apr 29
James CoffeyData Wrangling with Amazon EMR and SageMaker StudioWelcome to the first chapter of our “Machine Learning Pipeline for Malware Detection in Network Traffic” blog series, where we’ll dive into…Apr 26Apr 26
James CoffeyBuilding an End-to-End ML Pipeline for Malware DetectionIn this blog series, I’ll show you how to build an end-to-end machine learning pipeline for malware detection using Amazon Web Services.Apr 23Apr 23
James CoffeyGCN with Neo4j and PyTorch Using MUTAG Dataset in Ten StepsThis blog post originally appeared on my personal website (jamescoffey.co) on June 30, 2021.Nov 14, 2023Nov 14, 2023
James CoffeySuper-resolutionThis blog post originally appeared on my personal website (jamescoffey.co) on June 18, 2021.Nov 14, 2023Nov 14, 2023
James CoffeyStatoil/C-CORE Iceberg Classifier ChallengeThis blog post originally appeared on my personal website (jamescoffey.co) on June 16, 2021.Nov 14, 2023Nov 14, 2023