Across
- 2. A common type of attack used by which a hacker or a scammer to gain access to a network or account by manipulating the human aspect
- 4. A form of many-valued logic that deals with approximate reasoning and allows for degrees of truth instead of just true or false
- 5. One of the largest public blockchains that is widely used by developers to build decentralized apps or DApps
- 6. The world's largest educational and scientific computing society, advancing computing as a science and a profession.
- 7. A type of recurrent neural network architecture designed to capture long-term dependencies in sequential data
- 8. A service provided by a popular cloud computing platform for utlising VPS. Owned by a company named after a rainforest.
- 9. An unusual programming language where the code has the unique attribute of looking like Pixel art
Down
- 1. A type of ML model that combines predictions from multiple models to improve accuracy
- 3. The practice of concealing a message, file, or other data within another message, file, or piece of data, often used for secure communication and digital watermarking
- 4. A network security tool focused on preventing unauthorized access
