The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Jan 19, 2018Updated 8 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆11Jun 13, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A script to generate the Hackers Against Humanity deck.☆14Jan 21, 2024Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆14Dec 11, 2012Updated 13 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆15May 28, 2025Updated 11 months ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆13Mar 20, 2026Updated last month
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- A simple comic viewer for Android. It has a gallery activity to show the cover of the available comics, bookmarking support and shows com…☆17May 22, 2014Updated 11 years ago
- Firefox Addon to fool websites with spoofed X-Forwarded-For headers☆18Oct 13, 2013Updated 12 years ago
- Model Based Testing of the App Based On The Description from Constructing the User Interface with Statecharts Book of Ian Horrocks using …☆13Feb 20, 2024Updated 2 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Website for the Mininet Project.☆12Apr 1, 2022Updated 4 years ago
- Referrer Test for Google Play is an Android test application that shows how you can pass a 'referrer' string from a website/email/ad/what…☆22Jun 10, 2015Updated 10 years ago
- The IT Passport Quiz App is designed to help users prepare for the IT Passport Examination. This app provides a variety of questions cove…☆17Oct 19, 2024Updated last year
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆81Apr 3, 2021Updated 5 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This version has been superceded by http://github.com/concordion/concordion.net. Concordion is an acceptance testing framework that allow…☆14Oct 11, 2017Updated 8 years ago
- A test for new users joining the server using hCaptcha. 🔍☆10Apr 11, 2026Updated last month
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆14Apr 15, 2024Updated 2 years ago
- Few-Shot Relation Extraction with AllenNLP☆12Jan 27, 2019Updated 7 years ago
- javascript:(function()%7Bfunction start() %7B%0A loadGUI()%3B%0A addUtils()%3B%0A%7D%0A%0Afunction wait(time) %7B%0A return new …☆55Sep 23, 2022Updated 3 years ago
- This repo collects the scripts and configs required to run https://wiki.gentoo.org/wiki/User:Juippis/The_ultimate_testing_system_with_lxd☆11Jun 7, 2024Updated last year