A masker and wiper for RAM data
-
Updated
Jun 16, 2022 - C
A masker and wiper for RAM data
Cyber Attacks Mitigation
Application of cryptography concepts and techniques to make a security audit and design a mitigation plan for a SME
This project was designed to explore the correlations between Delaware State COVID restrictions and small business closures and loss in revenue. In addition, this project illustrates Delaware COVID case counts by ZIP code as well as predict tomorrow's COVID case counts
The code presented here is meant to accompany our Playbook, which illustrates our threshold adjustment methodology that can mitigate bias in EHR-based classification models. Our paper and the Playbook can be found in npj Digital Medicine at the link below:
Modeling and Global Sensitivity Analysis of Strategies to Mitigate Covid-19 Transmission on a Structured College Campus
As the Red Team, attack a vulnerable VM within the environment, ultimately gaining root access to the machine. As Blue Team, use Kibana to review logs taken during Day 1 engagement of Red Team’s attack.. Use the logs to extract hard data and visualizations for a detailed report of findings.
Allows users to create, manage, and interact with a database of malware families
Add a description, image, and links to the mitigation-strategies topic page so that developers can more easily learn about it.
To associate your repository with the mitigation-strategies topic, visit your repo's landing page and select "manage topics."