In this article, the author demystifies the business of encrypting and decrypting network traffic, and translates arcane terms such as https, ssh, sftp, etc.
GloVe + character embeddings + bi-LSTM + CRF for Sequence Tagging (Named Entity Recognition, NER, POS) - NLP example of bidirectionnal RNN and CRF in Tensorflow
H. Yu, J. Han, and K. Chang. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 239--248. New York, NY, USA, ACM, (2002)
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management Methods, Models, and Tools, volume 1937 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)
G. Stumme, R. Wille, and U. Wille. Principles of Data Mining and Knowledge Discovery, volume 1510 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (1998)
J. Hereth, G. Stumme, R. Wille, and U. Wille. Conceptual Structures: Logical, Linguistic, and Computational Issues, volume 1867 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)