Monday, January 4, 2021

Tackling Detection Models’ Explainability with SHAP

Introduction At Hunters we aim to detect threat actors hiding in our customers’ assets. In order to do so, Hunters’ platform autonomously analyzes security logs to search for various types of information: IOCs from threat intel feeds, signatures of malicious behaviour based on a variety of TTPs, or anomalies in the data that could potentially…

The post Tackling Detection Models’ Explainability with SHAP appeared first on HUNTERS.

The post Tackling Detection Models’ Explainability with SHAP appeared first on Security Boulevard.

Read More

The post Tackling Detection Models’ Explainability with SHAP appeared first on Malware Devil.



https://malwaredevil.com/2021/01/04/tackling-detection-models-explainability-with-shap/?utm_source=rss&utm_medium=rss&utm_campaign=tackling-detection-models-explainability-with-shap

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...