SharifAmit / Semi-supervised-Phishing-Detection-GANLinks
[Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection
☆11Updated 2 years ago
Alternatives and similar repositories for Semi-supervised-Phishing-Detection-GAN
Users that are interested in Semi-supervised-Phishing-Detection-GAN are comparing it to the libraries listed below
Sorting:
- Extracting Attack Behavior from Threat Reports☆79Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆168Updated 4 years ago
- ☆17Updated 6 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Updated 3 years ago
- Repository of creating different example suricata data sets☆36Updated 6 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆102Updated last year
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Updated 5 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆112Updated 2 years ago
- ☆25Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆34Updated 2 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 8 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Updated 5 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆172Updated 2 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆26Updated 6 years ago
- Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs (Accepted by Automated Softwar…☆10Updated 3 years ago
- Experiments to detect phishing websites using neural networks☆23Updated 5 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆17Updated 3 years ago
- ☆88Updated 2 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆161Updated 2 weeks ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated last year