Billy1900 / Awesome-AI-for-cybersecurity
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).
☆115Updated last year
Alternatives and similar repositories for Awesome-AI-for-cybersecurity:
Users that are interested in Awesome-AI-for-cybersecurity are comparing it to the libraries listed below
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆143Updated 2 years ago
- Public datasets to help you address various cyber security problems.☆387Updated 2 years ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆21Updated 5 months ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆100Updated 5 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆189Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆169Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆201Updated 9 months ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆330Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆61Updated 5 years ago
- This project contains files for cyber security☆32Updated 6 years ago
- NLP model and tech for cyber security tasks☆85Updated last year
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆91Updated 2 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 4 years ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆43Updated 8 months ago
- Collection of Snort 2/3 rules.☆34Updated 6 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆80Updated 8 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 2 years ago
- A list of cybersecurity projects that use machine learning techniques☆57Updated 8 years ago
- ☆58Updated 2 years ago
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turbo☆11Updated last year
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆20Updated 4 years ago
- ☆21Updated 3 years ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆41Updated 9 months ago
- DDoS attack analysis using Machine Learning☆39Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆39Updated 2 years ago
- AI & Machine Learning: Detection and Classification of Network Traffic Anomalies based on IoT23 Dataset☆68Updated 3 years ago
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆118Updated 4 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆39Updated 2 years ago