chstan / CS259D
Repo for CS 259D: Data Mining for Cyber Security
☆18Updated 10 years ago
Alternatives and similar repositories for CS259D:
Users that are interested in CS259D are comparing it to the libraries listed below
- code for kaggle competition Microsoft malware classification☆41Updated 9 years ago
- security machine learning☆72Updated 7 years ago
- ☆62Updated 7 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- 第三届阿里云安全算法挑战赛☆37Updated last year
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅 读原始论文和讲义。☆72Updated 6 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- ☆11Updated 7 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 10 years ago
- Sample DGA classifier☆124Updated 9 years ago
- ☆11Updated 7 years ago
- public database for research☆17Updated 8 years ago
- Kaggle微软恶意代码分类☆153Updated 4 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- This is code for my CERN presentation☆62Updated 7 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 10 months ago
- 滴滴黑产识别的离群点检测python自用包☆42Updated 5 years ago
- Log clustering by detecting the similarity between two logs.☆13Updated 8 years ago
- code for kaggle competition Microsoft malware classification☆251Updated 9 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Short Course - Applied Machine Learning for Security Informatics☆58Updated 8 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- ☆50Updated 9 years ago
- malware classify 第三届『阿里云安全算法挑战赛』源码☆16Updated 6 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated 8 months ago
- ☆12Updated 7 years ago
- Implementation of the DeepLog anomaly detection system☆19Updated 6 years ago
- 第三届阿里云算法赛_i_hate_mcdonalds团队_解决方案☆56Updated 6 years ago