Weidong YanginKinevizInvestigating Cybersecurity in Public CompaniesExtract and visualize incidents reported in SEC 8K and 6K filingsMar 15Mar 15
Weidong YanginKinevizThe Feature Graph for Proactive Threat DetectionIn a previous article, I introduced a tiered architecture for detecting and combining specific patterns in big data streams.Dec 8, 2023Dec 8, 2023
Weidong YanginKinevizGraph Strategy for Proactive Threat ResponsePatterns of events that signal a threat can often be found after the fact in an enterprise’s big data archive. The patterns are typically…Nov 28, 20231Nov 28, 20231
Weidong YanginKinevizAI-Powered Knowledge Maps for Navigating Unstructured DataInvestigations often involve analyzing large document sets–from text such as emails to audio and video content–and the amount of pertinent…Sep 15, 2023Sep 15, 2023
Weidong YangAI: Breeding Ground for the Ultimate Psychopath?When asked “Is Lecter Hannibal a psychopath or sociopath?”, ChatGPT answered:Jul 11, 20231Jul 11, 20231
Weidong YanginKinevizA visual language for exploratory graph data analyticsCompared with solutions based on traditional relational data models, solutions based on graph models — especially the LPG (Labeled…Nov 17, 2022Nov 17, 2022
Weidong YanginKinevizFollow the Money Part IAnalyzing the flow of money from financial transactions reveals fraudulent activities as well as the inner workings of collusion among…Aug 31, 202215Aug 31, 202215
Weidong YanginKinevizMapping JSON to graph with GraphXRJSON is a very popular and versatile data format. Its nested tree structure is essentially a graph. In fact JSON is often used to store…Aug 17, 2022Aug 17, 2022
Weidong YanginKinevizWhen and where did two suspects meet?This example illustrate how we can visually identify when and where two suspects meet. Data is taken from a Kaggle challenge: Criminal…Aug 11, 2022Aug 11, 2022