Medical Knowledge(@learnmedicineMD) 's Twitter Profile Photo

Sensitivity
= TruePositive / (TruePositive + FalseNegative)

Specificity
= TrueNegative / (TrueNegative + FalsePositive)

Positive Predictive Value
= TruePositive / (TruePositive + FalsePositive)

Negative Predictive Value
= TrueNegative / (TrueNegative + FalseNegative)

Sensitivity
= TruePositive / (TruePositive + FalseNegative)

Specificity
= TrueNegative / (TrueNegative + FalsePositive)

Positive Predictive Value
= TruePositive / (TruePositive + FalsePositive)

Negative Predictive Value 
= TrueNegative / (TrueNegative + FalseNegative)
account_circle
1stepGrow(@1stepGrow) 's Twitter Profile Photo

πŸ§‘πŸ½β€πŸ’» Sheet ✍🏽 - Read πŸ‘‡πŸ½πŸ‘‡πŸ½πŸ‘‡πŸ½

πŸ“ͺ In the post, let's discuss

1️⃣
2️⃣ or True Positive Rate
3️⃣ Rate
4️⃣

🎈 Follow 1stepGrow to get informative and learning posts.

πŸ§‘πŸ½β€πŸ’»#ConfusionMatrix #Cheat Sheet  ✍🏽 - Read πŸ‘‡πŸ½πŸ‘‡πŸ½πŸ‘‡πŸ½

πŸ“ͺ In the post, let's discuss

1️⃣ #PositivePredictiveValue
2️⃣ #Sensitivity or True Positive Rate
3️⃣ #TrueNegative Rate
4️⃣ #NegativePredictiveValue

🎈 Follow @1stepGrow to get informative and learning posts.
account_circle
EEC Extech Electronics Co.(@eecextech) 's Twitter Profile Photo

Did you know there is two types of ? Click here to download voltage whitepaper to understand why our technology is better and enhance your testing. ow.ly/HwFQ50juU2l

Did you know there is two types of #negative #voltage? Click here to download #EEC #Truenegative voltage whitepaper to understand why our technology is better and enhance your testing. ow.ly/HwFQ50juU2l
account_circle
TrueNegative(@truenegative1) 's Twitter Profile Photo

750$ for Stealing Facebook OAuth Code Through Screenshot viewer

Taking advantage of an image injection vulnerability in the Screenshot Viewer utility as well as additional vulnerabilities still being resolved.

hackerone.com/reports/488269

account_circle
TrueNegative(@truenegative1) 's Twitter Profile Photo

AnchorWatch - A Rogue Device Detection Script for Windows with Email Alerts. I wrote a PowerShell script that scans subnet(s) every X minutes and sends email alerts on each discovery.

github.com/iamrootsh3ll/A…

account_circle
TrueNegative(@truenegative1) 's Twitter Profile Photo

Digital Forensics

How to Find Active VPN Connection in the Memory Dump.

Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure.

m.habr.com/en/post/442590/

account_circle
TrueNegative(@truenegative1) 's Twitter Profile Photo

3 million vehicles can be unlocked remotely via trivially discovered web API vulnerability

pentestpartners.com/security-blog/…

account_circle