Lab41 / magichourLinks
Security log file challenge
☆28Updated 9 years ago
Alternatives and similar repositories for magichour
Users that are interested in magichour are comparing it to the libraries listed below
Sorting:
- Ipython notebook that illustrates effectiveness of machine learning algorithms in anomaly detection of netflow data (inbound/outbound DDo…☆79Updated 8 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Updated 8 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 11 years ago
- IPLoM (Iterative Partitioning Log Mining) - Java☆15Updated 9 years ago
- Implementation of the Loopy Belief Propagation algorithm for Apache Spark☆41Updated 5 years ago
- Probabilistic Sequence Mining☆46Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 9 years ago
- Aperture-Tiles uses familiar web-based map interactions to allow exploration of arbitrary huge data sets.☆74Updated 2 years ago
- This site has moved to the ONI organization at https://github.com/Open-Network-Insight☆14Updated 9 years ago
- A mapreduce implementation of SLCT (http://ristov.users.sourceforge.net/slct/) using Disco.☆16Updated 14 years ago
- Extract cyber security entities from unstructured text☆34Updated 8 years ago
- Semantic Preserving Embeddings for Generalized Graphs☆31Updated 7 years ago
- NOUS: Construction, Querying and Reasoning with Knowledge Graphs☆72Updated 3 years ago
- Probabilistic Itemset Mining☆19Updated 9 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- SociaLite: query language for large-scale graph analysis and data mining☆111Updated 9 years ago
- ☆12Updated 8 years ago
- ☆32Updated 8 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Updated 3 years ago
- An Exploration into Graph Databases☆28Updated 10 years ago
- Mine patterns from logs☆27Updated 9 years ago
- Assessing Source Code Semantic Similarity with Unsupervised Learning☆40Updated 7 years ago
- Graph database version of the CVE database☆26Updated 3 years ago
- ☆27Updated 11 years ago
- Detection modules of the Nemea system.☆21Updated 10 months ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 8 years ago
- An implementation of word2vec applied to [stanford philosophy encyclopedia](http://plato.stanford.edu/)☆36Updated 9 years ago
- HopsYARN Tensorflow Framework.☆31Updated 6 years ago
- code for kaggle competition Microsoft malware classification☆252Updated 10 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Updated 12 years ago