Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) are transforming the networking ecosystem through software, decoupling network functions from hardware where workloads are centrally controlled and deployed dynamically.

Activity Feed

Medium 1

Prateek K. updated project WarHammer status

Medium 1

Prateek Kumar

For security providers, sophisticated machine learning provides fast and accurate threat detection, including zero-day and previously unknown threats. Advanced heuristics and rules allow machine learning models to help determine in near real time if a file, URL, IP, or application is a threat, and then communicate that information broadly.

Despite an ever changing threat landscape, machine learning enables very high detection rates over time. Machine learning technology is now emerging as a critical component across all of the various domains of cybersecurity.

Machine learning can power next-generation endpoint protection, mobile protection, threat intelligence, web security and network anomaly detection offerings. It enables threat activity across multiple security domains to be contextually associated in real time.

Medium 1

Prateek K. created project WarHammer

Medium 355b551b 3cf2 4f7d 979c d7303d310e2e


With modern technology becoming obsolete in cyber security, we need to come up with innovative ideas to increase the notch up in the fight against unauthorized access to our information and data. I will be taking help of Theano,Torch,Microsoft CNTKA framework to start with and then modify the implementation as i move in later stages of the project. I will be trying to modify various protection algorithms and try to come up with a ML algorithm that takes help of deep learning frameworks. I will also be taking help of Gensim to validate my data collection as efficiently as possible. The changes to encryption and decryption techniques will be studied thoroughly in later stages. In a manner where DNA cannot be replicated , similarly developing a neural network net around my algorithm against network intrusion will be the deciding factor in the efficiency of the modified algorithm. I will also taking help of Apache Hadoop in analyzing my stored data from cyber attacks and storing the result of my predicament in Apache Spark to make real-time decisions. The main problem in using machine learning algorithms in cyber security is the creation of an overhead which has an adverse effect on algorithm's performance. To eliminate it to a appreciable stage I will be taking help of BlueData without any changes to Hadoop or Spark framework. Finally the performance of the algorithm will be tested with the help of BigBench kit to get a full report on the project.

Medium 0 1qw4iqlltcznpp28n novt28rrqnsggi8lvsyz2ltrqqslt8qlvo48aqh9znp0gu1lvoo1ki1 nq7uhefx4bpgrlk nn7ukiix4vwq25ahlg7r3eirhri3f4fw

Karan V. created project Internet of Things: wireless issues in using mobile communication network

Medium 083659db d288 485a 84cb 192d75d0fb90

Internet of Things: wireless issues in using mobile communication network

Internet of Things (IoT) is an emerging technology that effectively collects data from billions of connected things using sensors and devices, derives intelligence, builds context and helps transform the way businesses, as well as our society, are run. IoT enables new use cases due to real time information from things. IoT uses various communication networks to send information from sensors and devices to the server in the cloud for analysis. One of the popular networks is the Mobile Communication Network. Mobile Communication is ideal for connecting things on the move and things outside premises. For example, it is used heavily in transport and logistics industries for real time location of vehicles on the move using GPS technology. This project discusses various issues that arise in using mobile communication networks for IoT device-server connectivity and suggests possible solutions as well.

Medium corey headshot sq

Corey W. created project Cartoon Network Game Jam

Medium ad1dc8eb 0a2b 473b 9b83 3d6b2fbdc92b

Cartoon Network Game Jam

I co-organized a game jam where game makers created 48-hour jam entries based on judging criteria determined by Cartoon Network. At the end of the weekend, entries were given a short polishing period for their projects, then a winner was chosen! 16 Finalists won prize money and will have their work published in a Cartoon Network Game Jam bundle! The winning game jam team had a chance to negotiate a contract with Cartoon Network to provide the services to bring their project to fruition as a fully-fledged mobile app.

See More

Projects (45)

See All

Bigger 0 0noe1qqpuw fhvora9ihxyev2kxfhzxve5ghfobp2v blndziogsq0cpde1blq5vegiw mnmouxbgw5v007lxf9vwuxfgw49i07elqospnaagowxiuxwbgw9kb
  • Projects 0
  • Followers 0

Jonathan Wan

San Francisco Bay Area, CA, USA

Default user avatar 57012e2942
  • Projects 1
  • Followers 3

Thato Rampedi

Piano, Composition and gaming :). Pretty much where all my time goes.

South Africa

Bigger avatar
  • Projects 1
  • Followers 0

Francesca Tosi

Porto Sant'Elpidio, Province of Fermo, Italy

Bigger photo
  • Projects 0
  • Followers 0

Sayanta Neogi

2nd year computer science Hons student

Hooghly, West Bengal, India

See More

Thumb e7801888 75ee 472e 92d1 be20b8d25cae
  • Collaborators 2
  • Followers 36



Thumb u3nm 7ef Pavel Bayborodin

Created: 01/15/2016

Build a mobile app for your connected project or product in less than 5 minutes

Thumb 771a9e41 7813 4f79 b307 94100eacc29e
  • Collaborators 0
  • Followers 0



Thumb qgk3r0ui Joyce Rigelo

Created: 11/06/2016

With the superpowers of the Intel Joule and the RealSense Camera, ReconBot3000 patrols your home ...

See More