Start a New Search
SHOWING 2 RESULTS
“Analyst-driven solutions” rely on rules created by living experts and miss attacks that don’t match the rules. Machine-learning approaches rely on “anomaly detection,” which triggers false positives needing investigation by humans.
Protecting Individual Data | Protecting Systems | Safeguarding the Connected World | Massachusetts Institute of TechnologyThose designing coming augmented reality systems should make them adaptable to change, resistant to hacking and responsive to the needs of diverse users, according to a white paper by an interdisciplinary group of researchers at the University of Washington’s Tech Policy Lab.
Safeguarding the Connected World | Protecting Individual Data | University of Washington