The Bible of AI™

International scientific and technical publication on Artificial Intelligence | ISSN 2695-6411

Conferences and events

Next

https://estadosia.files.wordpress.com/2020/06/machine-learning-for-medical-imaging-analysis-demystified_v5.jpg

Machine Learning for Medical Imaging Analysis Demystified

This lecture will outline the fundamental ML processes involved in medical image analysis. Achieving prediction and classification for CAD applications will also be discussed. Some preliminary ideas of 3D reconstruction and viewing as applied in medical image analysis will also be presented.

https://estadosia.files.wordpress.com/2020/04/iii_congreso_auditorc38da_y_grc_the_bible_ai.jpg

III CONGRESO AUDITORÍA Y GRC (ISACA Madrid Chapter)

Este congreso, motivado por la creciente sensibilidad de las compañías en materia de Gobierno, Riesgo y Cumplimiento, se enfoca en generar una visión global de los procesos, gestión de riesgos, fraude, control interno y cumplimiento normativo y legislativo, sin dejar de lado la metodología y ejecución de revisiones y auditorías de los mismos


OTHER EVENTS | https://estadosia.files.wordpress.com/2020/05/rss.jpg


https://estadosia.files.wordpress.com/2020/05/cumplimiento_normativo_y_seguridad_ti_en_iot-3.jpg

Cumplimiento normativo y seguridad TI en IoT

La conectividad y el tratamiento masivo de datos son dos pilares esenciales para el desarrollo de estos sistemas, los cuales, a su vez, introducen riesgos de seguridad y privacidad que deben ser tratados adecuadamente.

INTERPOL: Impact of COVID-19 on Financial Crimes, webinar

The complexity of acting against cybercriminal internet domains was discussed; also on the techniques used in cybercrime… Information and detailed well-explained was offered by INTERPOL members, on how to detect and act in most cases.

https://estadosia.files.wordpress.com/2020/04/european-cyver-security-challenge.png

EUROPEAN CYBER SECURITY CHALLENGE

Top cyber talents from each participating country will meet in Vienna to network and collaborate and finally compete against each other. Contestants will be challenged in solving security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and in the process collect points for solving them.

%d bloggers like this: