Generative Adversarial Network to generate malware to evade detection
☆15Mar 25, 2023Updated 3 years ago
Alternatives and similar repositories for Cyber_Security
Users that are interested in Cyber_Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jun 15, 2025Updated 9 months ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- Deep learning malware detection system using the EMBER dataset☆12Nov 22, 2024Updated last year
- ☆11Jan 16, 2018Updated 8 years ago
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Wifi based Indoor Localization system utilizing Wi-Fi Fingerprinting Technique - AI/ML Approach☆23Sep 26, 2023Updated 2 years ago
- Jupyter notebooks for the book "Deep Learning with Python"☆11Aug 24, 2020Updated 5 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset an…☆14May 11, 2022Updated 3 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- ☆23Jan 18, 2018Updated 8 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆18Mar 12, 2025Updated last year
- ☆12Oct 29, 2018Updated 7 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Android Malware Detection using Deep Learning☆53Aug 21, 2019Updated 6 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- ☆14Mar 7, 2015Updated 11 years ago
- Machine Learning for Healthcare☆10Mar 28, 2020Updated 6 years ago
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- List of useful resources for AI in medicine - datasets, companies, papers, etc☆10Feb 26, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Network exploit detection using highly accurate pre-trained deep neural networks with Celery + Keras + Tensorflow + Redis☆22Dec 7, 2018Updated 7 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago