MeghaJakhotia / ComputerSecurityAttacksLinks
Contains SEED Labs solutions from Computer Security course by Kevin Du.
☆118Updated 5 years ago
Alternatives and similar repositories for ComputerSecurityAttacks
Users that are interested in ComputerSecurityAttacks are comparing it to the libraries listed below
Sorting:
- Contains SEED Labs solutions from Internet Security course by Kevin Du.☆47Updated 5 years ago
- Records & Reports for Seed-project☆95Updated 4 years ago
- SEED Labs developed in the last 20 years.☆844Updated 3 weeks ago
- Source code for my books☆163Updated 2 years ago
- This repository contains my implementation of SEED Labs☆15Updated 4 years ago
- Solutions for Network Security Labs offered by SEED Labs☆17Updated 3 years ago
- course materials and references for its450☆32Updated 3 years ago
- Python implementation of the message digest 5 (MD5) algorithm☆39Updated 2 years ago
- Online textbook for CS 161: Computer Security at UC Berkeley.☆75Updated 5 months ago
- A Python framework for creating emulation of the Internet.☆250Updated last month
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- ✍️ All of the challenges I have written for CTFs☆53Updated 3 years ago
- knowledge is power☆217Updated last month
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆19Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆151Updated last year
- Papers I have collected and read in undergraduate and graduate period☆52Updated last year
- Notes for Computer Networks Course☆12Updated 7 years ago
- To perform the experiments, CICIDS2017 intrusion detection dataset has been used because it contains benign and the most up-to-date commo…☆7Updated 7 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- ☆70Updated 2 years ago
- ☆16Updated 8 months ago
- A curated list of awesome side-channel attack resources☆80Updated last year
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆338Updated 2 years ago
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆12Updated 3 years ago
- My lab reports for some of the security labs developed by Prof. Du of SU.☆10Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆206Updated last year
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆184Updated last year
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆155Updated 2 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆69Updated 10 months ago