Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.
☆25Feb 15, 2023Updated 3 years ago
Alternatives and similar repositories for kassandra
Users that are interested in kassandra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- UEBA Solution for Insider Security. This repo is archived. Thanks!☆46Feb 28, 2020Updated 6 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- ☆13Feb 25, 2021Updated 5 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆474Apr 12, 2026Updated last week
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Convert Splunk SPL to Elasticsearch DSL with pegjs☆13Apr 25, 2022Updated 3 years ago
- Anomaly detection and monitoring software☆19Sep 7, 2018Updated 7 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Elasticsearch querying library☆20Jun 16, 2019Updated 6 years ago
- ☆11Jun 17, 2015Updated 10 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆17Apr 4, 2026Updated 2 weeks ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 11 months ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆41Nov 16, 2025Updated 5 months ago
- An overview of Complex Event Processing Systems☆29Apr 6, 2022Updated 4 years ago
- A System-Oriented Wargame Framework for Adversarial ML☆10Apr 24, 2023Updated 2 years ago
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- Tutoriales sobre el uso de la API de twitter en PHP☆14Aug 19, 2014Updated 11 years ago
- ☆18Apr 8, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Dockerization of CICFlowMeter, with an entry point to accept command line parameters when running the container.☆14May 8, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 记录我的安全学术学习☆130Dec 15, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year