YoVDO

Automated Implementation of Windows-Related Security-Configuration Guides

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Windows Security Courses Natural Language Processing (NLP) Courses Research Methodology Courses

Course Description

Overview

Explore an innovative approach to automating Windows security configuration in this 21-minute conference talk from ASE2020. Delve into the research conducted by Patrick Stöckle, Bernd Grobauer, and Alexander Pretschner as they present their method for extracting and implementing security guidelines using Natural Language Processing (NLP). Discover the motivation behind their work, understand the general idea of their approach, and learn about the verification process. Examine the key research questions addressed in the study and gain insights into the current limitations of this automated security configuration implementation. Access the full pre-print of this ACM-published research to deepen your understanding of this cutting-edge cybersecurity topic.

Syllabus

Motivation
General Idea
Extraction with NLP
Verification
Research Questions
RQ1, 2, 3
Current Limitations


Taught by

Association for Computing Machinery (ACM)

Related Courses

Introduction to Statistics: Inference
University of California, Berkeley via edX
Pragmatic Randomized Controlled Trials in Health Care
Karolinska Institutet via edX
Developing Your Research Project
University of Southampton via FutureLearn
實驗經濟學 (Experimental Economics: Behavioral Game Theory)
National Taiwan University via Coursera
中国古代史(大学先修课) | Ancient History of China
Peking University via edX