skip to content

Presented by: 
Thomas . (GCHQ)
Tuesday, March 16, 2021 - 11:45 to 12:10
INI Seminar Room 1

In cybersecurity we want to detect malicious activity by finding unusual patterns of behaviour.  The logs of events on a system can be modelled as trees that evolve over time; the path signature provides a way to extract features from these trees by considering them as a collection of paths.  We can then use these features in machine learning techniques, to distinguish different types of behaviour.