☆30May 5, 2017Updated 8 years ago
Alternatives and similar repositories for aiengine
Users that are interested in aiengine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- OPNids GUI, API and systems backend☆34Apr 14, 2019Updated 7 years ago
- Perl utilities to retrieve and/or set basic and enhanced telnet passwords (amongst others)☆16Jun 16, 2014Updated 11 years ago
- This is a frontend for the STIX™ (2.0) language.☆17Dec 20, 2018Updated 7 years ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- Scripts from my private ~/bin-tage☆22Mar 30, 2026Updated 2 weeks ago
- allow running docker bind volumes thru Hashicorp's NOMAD using the raw_exec driver☆13Nov 6, 2018Updated 7 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Apr 21, 2025Updated 11 months ago
- ☆12Nov 10, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- ☆14Jun 25, 2020Updated 5 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- ☆12May 9, 2022Updated 3 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆17Oct 5, 2024Updated last year
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Talpa Kernel file access interception modules☆17Oct 12, 2022Updated 3 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Mar 1, 2024Updated 2 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Sep 26, 2024Updated last year
- awsbe☆17Jun 1, 2022Updated 3 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 3 months ago
- Blog site built with Spring Boot☆15Apr 28, 2021Updated 4 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆34Oct 14, 2018Updated 7 years ago
- ☆19Apr 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A CALDERA plugin☆18Jul 28, 2020Updated 5 years ago
- HIDS/EDR Demo☆15Dec 13, 2020Updated 5 years ago
- PVDM, PVDBOW, doc2vec, sentence2vec, "Distributed Representations of Sentences and Documents ICML'14".☆21May 9, 2018Updated 7 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- A Distributed ResNet on multi-machines each with one GPU card.☆20Feb 13, 2018Updated 8 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- User space file system extension to protect from data leakage. This is code associated to a research paper published at https://arxiv.org…☆18Sep 17, 2025Updated 6 months ago