{"id":503,"date":"2026-04-18T20:38:26","date_gmt":"2026-04-18T20:38:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/?page_id=503"},"modified":"2026-04-21T20:08:48","modified_gmt":"2026-04-21T20:08:48","slug":"cyse-420-applied-machine-learning-in-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-420-applied-machine-learning-in-cybersecurity\/","title":{"rendered":"CYSE 420 &#8211; Applied Machine Learning in Cybersecurity"},"content":{"rendered":"\n<p class=\"has-text-align-center\">This course introduced the foundations of training and analyzing the results of machine learning models. These models were examined under a cybersecurity lens, often utilizing cybersecurity based training sets such as malware detection sets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Machine Learning Models Final Project<\/h2>\n\n\n\n<p><strong>An analysis paper that examines multiple machine learning models that have been trained on the same set, evaluating their accuracy, f1 score, and precision as metrics of performance.<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-420-Final-Project-Analysis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-420-Final-Project-Analysis.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course introduced the foundations of training and analyzing the results of machine learning models. These models were examined under a cybersecurity lens, often utilizing cybersecurity based training sets such as malware detection sets. Machine Learning Models Final Project An analysis paper that examines multiple machine learning models that have been trained on the same&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-420-applied-machine-learning-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/503"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=503"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/503\/revisions"}],"predecessor-version":[{"id":583,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/503\/revisions\/583"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}