The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Jan 19, 2018Updated 8 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated last year
- EdgyBot: A partially AFK Edgenuity Bot brought to you by EdgePlus+. Works on 99% of assignments offered by Edgenuity. It does all non tes…☆23Jan 27, 2024Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆12Mar 20, 2026Updated last month
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆18Sep 22, 2023Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- Open Automation Source Integrated Suite or (OASIS) is an open source plugin for FitNesse that enables the user to perform thick, thin, mo…☆15Apr 16, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- type into the url in blooket: javascript:(() => {/***************************************************************************************…☆10Mar 1, 2022Updated 4 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- payMe is a technical solution initiated by some concerned Nigerians aimed to catalyze the innate desire in humans to fairly compete in an…☆14Nov 30, 2022Updated 3 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆20Mar 26, 2022Updated 4 years ago
- A Laravel package to streamline development and testing by allowing quick login as any User 🪄. Adds a configurable route to login with a…☆10Dec 31, 2024Updated last year
- A simple comic viewer for Android. It has a gallery activity to show the cover of the available comics, bookmarking support and shows com…☆17May 22, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A performance load tests platform base python3+vue3+locust+grafana,cool and user-friendly(性能测试平台)☆13Apr 22, 2024Updated last year
- Model Based Testing of the App Based On The Description from Constructing the User Interface with Statecharts Book of Ian Horrocks using …☆13Feb 20, 2024Updated 2 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- Discussion Summarization is the process of condensing a text document which is a collection of discussion threads, using CBS (Cluster Bas…☆12Apr 10, 2014Updated 12 years ago
- Referrer Test for Google Play is an Android test application that shows how you can pass a 'referrer' string from a website/email/ad/what…☆22Jun 10, 2015Updated 10 years ago
- Website for the Mininet Project.☆12Apr 1, 2022Updated 4 years ago
- A service for end-to-end (functional) testing of a bot. Programmatically simulate a user’s back-and-forth conversation with a bot, to tes…☆18Feb 12, 2026Updated 2 months ago
- The IT Passport Quiz App is designed to help users prepare for the IT Passport Examination. This app provides a variety of questions cove…☆17Oct 19, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 5 years ago
- In this project I have performed analysis and prediction on 1,3,and 5 year returns on 1064 mutual funds in India. I have scraped data fro…☆15Jul 25, 2022Updated 3 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Jul 10, 2018Updated 7 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆80Apr 3, 2021Updated 5 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago