skip to content

 
Presented by: 
Thomas . (GCHQ)
When: 
Tuesday, March 16, 2021 - 11:45 to 12:10
Venue: 
INI Seminar Room 1
Abstract: 

In cybersecurity we want to detect malicious activity by finding unusual patterns of behaviour.  The logs of events on a system can be modelled as trees that evolve over time; the path signature provides a way to extract features from these trees by considering them as a collection of paths.  We can then use these features in machine learning techniques, to distinguish different types of behaviour.