PhunterGuess the size of an atomic bomb and an iOS supply chain attackGuesstimation from limited information6 min read·Aug 24, 2022----
PhunterZero hacking problem: do we really protect the customers?Statistical modeling on zero events3 min read·Aug 17, 2022----
PhunterLinkedin spam: a case study of robust feature engineeringBuild a robust model so attackers can’t fight back (quickly)4 min read·Aug 3, 2022----
PhunterNine cars, twenty-five horses and beyondPuzzles solved by a large scope in math and a general formula exists5 min read·Jun 11, 2022----
PhunterCybersecurity problem solving with explainable machine learningExplaining the prediction can help to identify the key features and monitor any data drift or adversarial attacks.9 min read·Feb 15, 2022----
PhunterUseful useless models: an approach to model complex cybersecurity problem solvingA practical approach to get more ideas what to work on.16 min read·Jan 9, 2022----
PhunterWhy your machine learning models fail to solve cybersecurity problems: being narrow-minded forthMachine learning is not everything! Think out of this ML box!11 min read·Dec 20, 2021----
PhunterWhy your machine learning models fail to solve cybersecurity problems: non-sense metrics thirdthe more effort, a wrong metrics can drive the work to more wrong10 min read·Dec 12, 2021----
PhunterWhy your machine learning models fail to solve cybersecurity problems: fragility secondSOC hates ML models because they can’t use them. Fixing fragility can help.14 min read·Oct 18, 2021----
PhunterWhy your machine learning models fail to solve cybersecurity problems: feature space firstA series of posts about machine learning effectiveness in production, the failure, the reason, and the fix.8 min read·Sep 30, 2021----