SharifAmit / Semi-supervised-Phishing-Detection-GANLinks
[Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection
☆12Updated 2 years ago
Alternatives and similar repositories for Semi-supervised-Phishing-Detection-GAN
Users that are interested in Semi-supervised-Phishing-Detection-GAN are comparing it to the libraries listed below
Sorting:
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆33Updated 2 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆166Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- ☆17Updated 6 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆64Updated 5 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Updated 2 years ago
- ☆25Updated 4 years ago
- Insider threat detection via bert☆20Updated 3 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated last year
- Adversarial Malware Generator Using GANs☆54Updated last year
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs (Accepted by Automated Softwar…☆10Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 8 months ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Updated 3 years ago
- ☆13Updated 11 months ago
- AI: Deep Learning for Phishing URL Detection☆53Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- Insider Threat Detection using Isolation Forest☆17Updated 7 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- User and Entity Behavior Analytics by deep learning☆113Updated 4 years ago
- ☆12Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆21Updated 3 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Updated 3 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Updated 3 years ago