AI/ML Security Researcher & Policy Analyst | AI Security Patent Holder | OWASP AI Exchange Core Author Team | AI for Aerospace | Native - Cherokee ᏥᏣᎳᎩ.
🕷
Follow me on LinkedIn
Email: disesdi.susannacox@owasp.org
Personal: anglesofattack.io
An OODA Loop-based game theoretic model of information warfare in AI/ML systems, with boolean-path threat modeling & cyber resiliency metrics, + a secure, operationalized, platform-agnostic, fully audited debiasing architecture adapted to the canonical MLOps development cycle
A repo for some of the most influential papers, books, & other media on machine learning operations (MLOps), adversarial machine learning, AIML policy and compliance, & more.
Multi-class password entropy analysis with TF-IDF vectorization and Extreme Gradient Boosting
Exploring machine learning attacks on Physical Unclonable Functions (PUFs), a proposed authentication method for resource-constrained and security-vulnerable applications such as Unmanned Aircraft Systems (UAS), and Internet of Things (IOT) devices
A proof-of-concept for evaluating cultural bias on small corpora using cosine similarity and Word2Vec neural networks, extending the Word Embedding Association Test (WEAT) framework proposed in 2016 by Caliskan et al
A python game theory project to auto-generate multi-strategy Axelrod tournaments, & visualize their results
Cybersecurity Policy for Aviation and Internet Infrastructures - University of Colorado 8JU6AFZSWSQ2
Digitalisation in Aeronautics - Technical University of Munich CLFHURZT5P27
Palo Alto Networks Cybersecurity Foundations - Palo Alto Networks AKCVN7NW9L2P
Cybersecurity Roles, Processes & Operating System Security - IBM XF59TGHNNERG
Cybersecurity Compliance Framework & System Administration - IBM UNKJ9XW9FBU3
Cyber Threat Intelligence - IBM 34BASRB7Q3YH
Penetration Testing, Incident Response and Forensics - IBM FKF2T5CTM8QR
Network Security & Database Vulnerabilities - IBM ESEUHCJ9FCFF
Python for Active Defense - Infosec B7X8AKXF7NYB
Python for Command-and-control, Exfiltration and Impact - Infosec MA6CWHUF622A
Credential Access, discovery, lateral movement & collection - Infosec 35UZ965WHBAA
Execution, persistence, privilege escalation and evasion - Infosec 57K8K48WGW73
Python for Cybersecurity Specialization - Infosec DGZVN4847K5P
Security Analyst Fundamentals Specialization - IBM 5TPFXM9NG6MT
IT Fundamentals for Cybersecurity Specialization - IBM A2RM3XPTA7FK
IBM Cybersecurity Analyst Specialization - IBM R66Q59JPWBL8
IBM Fundamentals of Scalable Data Science - IBM HJW55WWBFTCJ
IBM Advanced Machine Learning and Signal Processing - IBM PJYXKUEEC3E4
🕷