Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.
☆11May 30, 2017Updated 8 years ago
Alternatives and similar repositories for Threat-Detection-using-Sentiment-Analysis
Users that are interested in Threat-Detection-using-Sentiment-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Hospital Management System project done during Computer Science and Engineering course at NIT Silchar, India.☆13Nov 24, 2014Updated 11 years ago
- Responsive Food Ordering Website with HTML, CSS and JavaScript☆10Jan 20, 2022Updated 4 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- CQL parser for Java☆15Feb 10, 2026Updated 2 months ago
- ☆19Apr 16, 2026Updated 3 weeks ago
- 使用中文情感词汇本体库进行情感分析,之 后对每种情感的文本进行主题分析。Using Chinese Sentiment Dictionary for Sensitive Analysis, Then applying LDA Topic Analysis for each E…☆14Jan 20, 2021Updated 5 years ago
- Dead simple and stupid, built for Python3 to use flask, flask-login, pymongo to authenticate/register user and check if user is logged in☆12Feb 8, 2017Updated 9 years ago
- Source code for "Chinese Financial News Annotation For Target-based Sentiment Analysis"☆14Jan 21, 2020Updated 6 years ago
- In order to analyze the sentiment orientation on Chinese social platform, our group scraped raw reposts during the period when domestic C…☆16Mar 31, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 6 years ago
- The Experience API / XAPI / tincan api integration provider for Sakai☆11Mar 25, 2021Updated 5 years ago
- Image recognition on Spark cluster powered by Deeplearning4j and Apache Tika☆14May 16, 2017Updated 8 years ago
- Yet another sentiment analysis system of Chinese.☆18Nov 10, 2016Updated 9 years ago
- ☆15May 21, 2021Updated 4 years ago
- About Nam Ha Minh's GitHub☆15Feb 20, 2023Updated 3 years ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje …☆15Dec 12, 2016Updated 9 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Submission of an in-class NLP sentiment analysis competition held at Microsoft AI Singapore group. This submission entry explores the per…☆15Oct 10, 2022Updated 3 years ago
- ☆21May 19, 2016Updated 9 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- ☆15May 9, 2020Updated 6 years ago
- Twitter tweets play an important role in every organisation. This project is based on analysing the English tweets and categorizing the t…☆15Sep 16, 2020Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A custom GUI based NIDS (Network Intrusion Detection System) with stream follow capability for HTTP2 and TLS/TCP☆11Sep 6, 2024Updated last year
- Instagram Pictures Downloader In Android !☆10Jul 5, 2023Updated 2 years ago
- Sentiment Analysis on tweets from US airlines customers☆15Apr 9, 2018Updated 8 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ☆22Jul 2, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- A Collection of Clustering Algorithms Implemented in Javascript☆25May 9, 2015Updated 11 years ago