<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="et">
	<id>http://courses.cs.taltech.ee/w/index.php?action=history&amp;feed=atom&amp;title=Public_Lecture_Laskov_2014</id>
	<title>Public Lecture Laskov 2014 - Redigeerimiste ajalugu</title>
	<link rel="self" type="application/atom+xml" href="http://courses.cs.taltech.ee/w/index.php?action=history&amp;feed=atom&amp;title=Public_Lecture_Laskov_2014"/>
	<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Laskov_2014&amp;action=history"/>
	<updated>2026-04-07T00:51:50Z</updated>
	<subtitle>Selle lehekülje redigeerimiste ajalugu</subtitle>
	<generator>MediaWiki 1.35.9</generator>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Laskov_2014&amp;diff=101&amp;oldid=prev</id>
		<title>Rain – 3. veebruar 2014, kell 16:56</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Laskov_2014&amp;diff=101&amp;oldid=prev"/>
		<updated>2014-02-03T16:56:43Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;et&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;←Vanem redaktsioon&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Redaktsioon: 3. veebruar 2014, kell 16:56&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;1. rida:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;1. rida:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title: Towards Automatic Detection of Novel Security Threats&amp;#039;&amp;#039;&amp;#039; (venia legendi)&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title: Towards Automatic Detection of Novel Security Threats&amp;#039;&amp;#039;&amp;#039; (venia legendi)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Speaker: Dr Pavel Laskov, University of Tuebingen&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Speaker: Dr Pavel Laskov, University of Tuebingen&amp;#039;&amp;#039;&amp;#039; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;([http://www-rsec.cs.uni-tuebingen.de/laskov/ website])&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Location: X-212 (TUT social sciences building, Akadeemia 3, right next to the library)&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Location: X-212 (TUT social sciences building, Akadeemia 3, right next to the library)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rain</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Laskov_2014&amp;diff=72&amp;oldid=prev</id>
		<title>Rain: Uus lehekülg: &#039;&#039;&#039;&#039;Title: Towards Automatic Detection of Novel Security Threats&#039;&#039;&#039; (venia legendi)  &#039;&#039;&#039;Speaker: Dr Pavel Laskov, University of Tuebingen&#039;&#039;&#039;  Location: X-212 (TUT social sciences ...&#039;</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Laskov_2014&amp;diff=72&amp;oldid=prev"/>
		<updated>2014-01-24T15:31:55Z</updated>

		<summary type="html">&lt;p&gt;Uus lehekülg: &amp;#039;&amp;#039;&amp;#039;&amp;#039;Title: Towards Automatic Detection of Novel Security Threats&amp;#039;&amp;#039;&amp;#039; (venia legendi)  &amp;#039;&amp;#039;&amp;#039;Speaker: Dr Pavel Laskov, University of Tuebingen&amp;#039;&amp;#039;&amp;#039;  Location: X-212 (TUT social sciences ...&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Uus lehekülg&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title: Towards Automatic Detection of Novel Security Threats&amp;#039;&amp;#039;&amp;#039; (venia legendi)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Speaker: Dr Pavel Laskov, University of Tuebingen&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Location: X-212 (TUT social sciences building, Akadeemia 3, right next to the library)&lt;br /&gt;
&lt;br /&gt;
Time: 1000-1130, 6th of February&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Abstract:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
Computer security is a never-ending race between attack and defense. What makes this race particularly challenging nowadays is the value of assets targeted by cyberattacks. One a &amp;quot;mass-market&amp;quot; of cybercrime lie personal credentials of millions of Internet users such as credit card and bank account numbers, email and social network accounts, virtual currencies in online games and many other kinds of personal information that can be exploited for monetary profit. On the other end of computer attack spectrum lies targeted penetration of highly sensitive corporate or governmental sites, with the aim of stealing corporate know-how and classified data, or even carrying out acts of sabotage. The strong &amp;quot;economic motivation&amp;quot; behind modern cyberattacks fuels a rapid development of novel attack methods and raises a major challenge for security technologies: to detect previously unseen threats.&lt;br /&gt;
&lt;br /&gt;
A powerful instrument for effective protection against novel security threats is data analysis tools. An almost unlimited amount of data can be collected by monitoring various security-related indicators such as audit logs and network traffic. Using such data, predictive models can be built by machine learning methods and subsequently deployed to assess previously unseen data. In this talk, I will review the general principles of building data-driven cybersecurity techniques and present examples of several successful reactive security systems built on these principles. As a future challenge, I will discuss the problem of secure data analysis, the importance of which transcends the field of cybersecurity and has a potential impact on many crucial Internet applications.&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
Please feel free to forward the lecture information to any interested parties. &lt;br /&gt;
&lt;br /&gt;
More information about the public lectures: [http://courses.cs.ttu.ee/pages/Public_Lectures http://courses.cs.ttu.ee/pages/Public_Lectures]&lt;/div&gt;</summary>
		<author><name>Rain</name></author>
	</entry>
</feed>