alexamanpreet / Network-Log-and-Traffic-AnalysisView external linksLinks
Identify malicious behavior and attacks using Machine Learning with Python
☆49Jan 17, 2017Updated 9 years ago
Alternatives and similar repositories for Network-Log-and-Traffic-Analysis
Users that are interested in Network-Log-and-Traffic-Analysis are comparing it to the libraries listed below
Sorting:
- Root app for Motorola devices to backup, restore, or flash new .ISO images into the 'CD-ROM' partition.☆10Aug 25, 2017Updated 8 years ago
- A collection of useful n8n templates and workflows for various use cases. Contribute your own templates and explore shared workflows by t…☆20Dec 2, 2025Updated 2 months ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Source code of the institutional insights TradingView indicator.☆10Jan 30, 2025Updated last year
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- ChatterBot: Machine learning in Python ChatterBot ChatterBot is a machine-learning based conversational dialog engine build in Python whi…☆11Dec 18, 2019Updated 6 years ago
- Android App - RemoteCodeExecution☆14Aug 20, 2013Updated 12 years ago
- 毕业设计-基于YOLOv8模型的车牌识别研究☆17May 10, 2024Updated last year
- Library management system using python☆11Mar 13, 2019Updated 6 years ago
- Deep learning code☆10Jun 9, 2023Updated 2 years ago
- A Splunk app for obtaining information from web apps☆11Feb 9, 2021Updated 5 years ago
- 基于地理加权回归(GWR)模型探索城市环境对共享单车出行的影响,使用POI数据作为城市环境变量。☆18Apr 26, 2024Updated last year
- This is a machine learning challenge conducted by C&D Labs and Future Group in association with HackerEarth.☆10Nov 17, 2017Updated 8 years ago
- RFM (recency, frequency, monetary) analysis☆13Aug 11, 2018Updated 7 years ago
- Three datasets to practice Threat Hunting against.☆46Jan 3, 2024Updated 2 years ago
- Secure Federated Learning Framework with Encryption Aggregation and Integer Encoding Method.☆10Jul 1, 2024Updated last year
- Data Analysis and Image Processing Python Course☆12Nov 4, 2014Updated 11 years ago
- API todomi - Hexagonal architecture deep understanding☆12Jan 28, 2023Updated 3 years ago
- Code for a tutorial on how to use the IBM Log Analysis and monitoring with IBM Cloud Monitoring☆11Sep 16, 2024Updated last year
- Learn Go with test-driven development'ın Türkçeye çevrilmesinin ilerlediği repodur.☆13Jan 5, 2024Updated 2 years ago
- Run EKS Windows containers with group Managed Service Account (gMSA)☆10Feb 26, 2021Updated 4 years ago
- ☆45Updated this week
- ☆13Aug 8, 2021Updated 4 years ago
- Android based vote verification application for Estonian I-voting system☆19Oct 3, 2025Updated 4 months ago
- Source code for http://allaboutscala.com/scala-cheatsheet/☆10Jun 12, 2018Updated 7 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- SIEM, Visibility, and Event-Driven Architecture Curated Solutions. Build a cost-effective threat detection and log management system.☆17Jan 17, 2024Updated 2 years ago
- Kibana Plugin to Associate custom CSS to Dashboards☆11May 11, 2021Updated 4 years ago
- ☆10Apr 13, 2025Updated 10 months ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- A variable inspector nbextension for Jupyter☆13Feb 23, 2018Updated 7 years ago
- Set Operations App for Splunk☆10Mar 29, 2021Updated 4 years ago
- Complete Python-3 programming tutorials from beginner to advanced level.☆11Jul 28, 2019Updated 6 years ago
- A simple employee shift and schedule management system that I developed during my internship at DXC Technologies.☆11Jan 5, 2023Updated 3 years ago
- https://www.packtpub.com/books/info/authors/tomasz-lelek☆12Oct 30, 2021Updated 4 years ago
- Klogd2 is a new version of klogd, which is nothing but a simple program to stream Syslog messages to a Kafka server