SharifAmit / Semi-supervised-Phishing-Detection-GAN
[Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection
☆12Updated 2 years ago
Alternatives and similar repositories for Semi-supervised-Phishing-Detection-GAN:
Users that are interested in Semi-supervised-Phishing-Detection-GAN are comparing it to the libraries listed below
- NLP model and tech for cyber security tasks☆85Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆25Updated 5 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆26Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆83Updated 7 months ago
- ☆75Updated last year
- ☆14Updated 3 years ago
- ☆21Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆59Updated 4 years ago
- ☆11Updated 3 years ago
- Insider threat detection via bert☆18Updated 3 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Adversarial Malware Generator Using GANs☆52Updated 6 months ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆19Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated last year
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆33Updated 7 months ago
- ☆16Updated 5 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆13Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 11 months ago
- Repository of creating different example suricata data sets☆32Updated 6 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆97Updated last year
- ☆12Updated 2 years ago
- ☆50Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆18Updated 3 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆170Updated last year