Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 18: Machine Learning in Cybersecurity!

Instruction

18.5. Discussion

The previous experiments have highlighted "why the state-of-the-art anti-ransomware tools assisted by machine learners are still insufficient to detect ransomware versions from different ancestor families and multi-descent families in a realistic environment." The answers to this question can be summarized as follows:

  • Shortage in static analysis: Not all state-of-the-art machine learne...