SharifAmit / Semi-supervised-Phishing-Detection-GANLinks
[Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection
☆11Updated 3 years ago
Alternatives and similar repositories for Semi-supervised-Phishing-Detection-GAN
Users that are interested in Semi-supervised-Phishing-Detection-GAN are comparing it to the libraries listed below
Sorting:
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Updated 3 years ago
- NLP model and tech for cyber security tasks☆86Updated 2 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 4 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Updated 3 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- ☆12Updated 3 years ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Updated 7 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 6 years ago
- ☆13Updated last year
- ☆25Updated 4 years ago
- Insider threat detection via bert☆23Updated 4 years ago
- Detecting malicious URLs using an autoencoder neural network☆42Updated 3 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆31Updated last year
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 8 years ago
- ☆18Updated 6 years ago
- Open Source testing framework for image correlation, distance and analysis☆44Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs (Accepted by Automated Softwar…☆10Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Updated 4 years ago