no code implementations • 27 Apr 2017 • Avi Pfeffer, Brian Ruttenberg, Lee Kellogg, Michael Howard, Catherine Call, Alison O'Connor, Glenn Takata, Scott Neal Reilly, Terry Patten, Jason Taylor, Robert Hall, Arun Lakhotia, Craig Miles, Dan Scofield, Jared Frank
Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber-defense realm.