The comparison of the performance of different machine learning methods for computer security problems
☆10May 19, 2024Updated last year
Alternatives and similar repositories for Machine-learning-for-cybersecurity
Users that are interested in Machine-learning-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- The notes are the supplement to papers and handouts of CS 259D☆21May 4, 2018Updated 7 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- A Ruby client library for Redis☆27Jan 5, 2024Updated 2 years ago
- A sample chef recipe repo for learning chef-solo☆60Jan 31, 2009Updated 17 years ago
- Java/kotlin library for easy access to the Kinopoisk(кинопоиск) data.☆11Jul 29, 2021Updated 4 years ago
- scheme on the rbx vm☆27Oct 27, 2013Updated 12 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Deep learning framework for multimodal sensor fusion.☆13Aug 21, 2017Updated 8 years ago
- An Actor library based around Redis. Useful for coordination, command and control of distributed ruby processes☆66Jan 3, 2010Updated 16 years ago
- ☆406Feb 3, 2010Updated 16 years ago
- Apriori algorithm implementation☆14Feb 2, 2018Updated 8 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- An implementation of Contract-Net Protocol in an attacker/defender scenario☆11Jul 8, 2022Updated 3 years ago
- An Efficient Supply Chain Management System using Blockchain & Machine Learning.☆10Nov 27, 2019Updated 6 years ago
- Fast string searcher, useful for multi-part post parsing☆11Feb 24, 2021Updated 5 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- Wechat pay V2 and V3.☆12Jul 4, 2017Updated 8 years ago
- This project intends to develop tools around AFDX. (Avionics Full Duplex Switched Ethernet).☆10Oct 27, 2010Updated 15 years ago
- Ambition adapter for ActiveLdap☆14Mar 26, 2008Updated 17 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- wechat pay 微信支付☆22Apr 30, 2014Updated 11 years ago
- Network Calculus for end-to-end delay bounds of an AFDX network.☆16Sep 3, 2020Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Make the current directory available on port 9292☆36Aug 17, 2010Updated 15 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- My Diploma Thesis on ArDrone 2.0 and Turtlebot2 collaboration for efficient exploration of unknown space.☆16Feb 2, 2019Updated 7 years ago
- Unmaintained Ambitious ActiveRecord adapter, for Ambition.☆15Apr 26, 2008Updated 17 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- A Simple & Fast Forum based on Tornado Frameworks written by Python☆16May 26, 2012Updated 13 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- A 3D NetLogo 5 multi-agents system simulating a civil UAV drones mission, where they have to escort and protect a humanitarian convoy tra…☆17Jun 1, 2021Updated 4 years ago
- A game only for hackers !!☆19Aug 18, 2018Updated 7 years ago
- Moved to http://github.com/github/github-services☆410Aug 30, 2018Updated 7 years ago
- Avionics Full-Duplex Switched Ethernet model for OMNeT++☆17Sep 13, 2017Updated 8 years ago
- nginx max connections queue☆38Feb 24, 2021Updated 5 years ago
- MATLAB codes and source data for the experimental calibration of a UAV digital twin☆17Jun 30, 2023Updated 2 years ago
- ☆21Dec 4, 2020Updated 5 years ago
- Simple On-Disk Queue in R☆26Nov 6, 2025Updated 4 months ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago