Generative Adversarial Network to generate malware to evade detection
☆15Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber_Security
Users that are interested in Cyber_Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jun 15, 2025Updated 9 months ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- Wifi based Indoor Localization system utilizing Wi-Fi Fingerprinting Technique - AI/ML Approach☆23Sep 26, 2023Updated 2 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- ☆23Jan 18, 2018Updated 8 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆16Apr 30, 2020Updated 5 years ago
- Android Malware Detection using Deep Learning☆53Aug 21, 2019Updated 6 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- 国密算法sm1,sm2,sm3,sm4算法源码☆12Feb 19, 2018Updated 8 years ago
- Stanford CS234, 2018☆10Mar 23, 2018Updated 8 years ago
- The repository is dedicated to Evasion Generative Adversarial Network source code.☆16Jun 9, 2022Updated 3 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- List of useful resources for AI in medicine - datasets, companies, papers, etc☆10Feb 26, 2018Updated 8 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Android Malware detection using Deep Learning Hybrid Model.☆24Mar 28, 2018Updated 7 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆19Feb 2, 2023Updated 3 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Tutorial for applying machine learning to text data within healthcare☆12May 12, 2023Updated 2 years ago
- Built an activity-aware pulse rate estimation using PPG and Accelerometer sensors.☆10Oct 3, 2021Updated 4 years ago
- Multi-class malware classification using Deep Learning☆76Oct 3, 2020Updated 5 years ago
- Web-based terminal emulator for docker containers☆21Mar 21, 2017Updated 9 years ago
- An interactive MATLAB tool for B-spline curves☆15Jan 19, 2015Updated 11 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- 基于机器学习的恶意代码检测☆13Apr 2, 2019Updated 6 years ago