-
ML Concepts: Words Embedding
Intro I keep going with the motivation of my upcoming small/simple session about ML and Cybersecurity. Last time I discussed an unsupervised clustering algorithm. We used multi-dimensional points (coordinates) in space. But what if our data is text? That’s common in “general”, but also in Cybersecurity. So the question becomes: Can we treat “text” as…
-
Random Exercises: Interpolation with Lagrange Polynomials
Intro As I want to make sure I keep posting here, I keep looking for things to write about in my own personal “library” (book shelves). One topic I want to make sure I don’t forget about is “Numerical Methods”. (Another one is graph theory, another one is anomaly detection… There are a few topics…
-
Cholesky’s matrix decomposition and where not to use it
It’s been a while since I last produced anything for the blog. So I’ll start easy (or so I thought, initially). Intro As I was asked to talk about AI for Cybersecurity, I have been thinking about it for a few weeks, refreshing concepts, taking some notes, gathering some ideas, sources… And one thing I…