albahnsen / ML_SecurityInformatics
Short Course - Applied Machine Learning for Security Informatics
☆58Updated 8 years ago
Alternatives and similar repositories for ML_SecurityInformatics:
Users that are interested in ML_SecurityInformatics are comparing it to the libraries listed below
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆152Updated 6 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- ☆52Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆46Updated 7 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆269Updated 2 years ago
- Machine Learning for Computer Security☆274Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 2 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆77Updated 9 years ago
- Collection of cyber security and "AI" relevant topics☆74Updated 7 years ago
- Malware Machine Learning☆27Updated 7 years ago
- RNN implementation with Keras for machine activity data to predict malware☆41Updated last year
- ☆93Updated 6 years ago
- My notes on various topics☆64Updated last year
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- security machine learning☆72Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆128Updated 3 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 4 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago