Short Course - Applied Machine Learning for Security Informatics
☆57Aug 26, 2016Updated 9 years ago
Alternatives and similar repositories for ML_SecurityInformatics
Users that are interested in ML_SecurityInformatics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Jan 24, 2019Updated 7 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆46Jun 17, 2025Updated 9 months ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,524Oct 1, 2020Updated 5 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆202Jan 18, 2023Updated 3 years ago
- Code to Implement the Smooth Euler Characteristic Transform (SECT)☆12Oct 22, 2019Updated 6 years ago
- implement some outlier detection algorithms☆11Sep 25, 2015Updated 10 years ago
- This repository contains the pytorch code for our BMVC 2022 paper "BaseTransformers: Attention over base data-points for One Shot Learnin…☆13Mar 20, 2024Updated 2 years ago
- ☆11Dec 17, 2024Updated last year
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Feb 10, 2017Updated 9 years ago
- OVSDB Client in Python☆15Oct 15, 2015Updated 10 years ago
- Labs for deep learning courses at UPC ETSETB TelecomBCN.☆17Mar 17, 2026Updated last week
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- PyData Boston 2013 talks: "Intro to scikit-learn" & "Realtime Predictive Analytics: Using scikit-learn and RabbitMQ"☆11Jan 5, 2014Updated 12 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- Spring-Cloud-Spel-RCE☆12Sep 16, 2022Updated 3 years ago
- An implementation of the Wav2Letter Speech-to-Text model using PyTorch.☆14Mar 8, 2023Updated 3 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- Docker image of Open vSwitch with ssh enabled running over supervisord☆13Mar 14, 2018Updated 8 years ago
- Manuscript and code for tesseroid gravitational modeling using variable density distributions☆12Dec 13, 2021Updated 4 years ago
- Material for a course on applied machine-learning for scientists. Taught at EPFL in spring 2018.☆11May 3, 2018Updated 7 years ago