“…New technologies, including probabilistic computing technologies, promise to considerably raise the standard on the amount of information that can be processed concurrently and, thus, are increasing the potential to identify suspicious communication on the internet (Camsari et al, 2017 ; Behin-Aein et al, 2016 ). While standard computers use stable magnets to hold their bits as stable ones or zeros, probabilistic computers replace the stable magnets with unstable magnets to allow their bits, known as p-bits, to fluctuate back and forth between ones and zeros (Camsari et al, 2020 ). This type of computing makes p-bits suitable for solving problems of probability, machine learning, and problems that have recently been addressed by quantum computing (Camsari et al, 2020 ).…”