Introduction to Machine Learning with Applications in Information Security
By Mark Stamp
Files
All
figures
that appear in the book (in color).
malwareBenignScores.txt
(See Chapter 5, Problem 10)
dbscan.txt
(See Chapter 6, Problem 16)
Tutorial on hidden Markov models
(essentially the same as Chapter 2 of the book)
Tutorial on AdaBoost
(expanded and corrected version of Section 7.4 of the book)
Tutorial on deep learning
(chapter-length replacement for Section 7.3 of the book)
Additional deep learning topics
(chapter-length discussion (mostly) of various architectures)
If you have any questions, comments, or suggestions, let me know.
Mark Stamp