chstan / CS259DLinks
Repo for CS 259D: Data Mining for Cyber Security
☆18Updated 10 years ago
Alternatives and similar repositories for CS259D
Users that are interested in CS259D are comparing it to the libraries listed below
Sorting:
- ☆62Updated 7 years ago
- code for kaggle competition Microsoft malware classification☆41Updated 10 years ago
- security machine learning☆72Updated 8 years ago
- Sample DGA classifier☆126Updated 10 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- code for kaggle competition Microsoft malware classification☆252Updated 10 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆132Updated 4 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- ☆32Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- dns tunnel dectect with CNN☆63Updated 5 years ago
- ☆33Updated 8 years ago
- Extract relationships between cyber security entities within unstructured text☆23Updated 6 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- 第三届阿里云安全算法挑战赛☆37Updated 2 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Kaggle微软恶意代码分类☆153Updated 5 years ago
- Uses deep learning and machine learning techniques to detect and classify web pages as spam, malware and phishing☆63Updated 4 years ago
- Applying text model to Detection Task☆73Updated 8 years ago
- public database for research☆17Updated 8 years ago
- Kaggle 'Microsoft Malware Classification Challenge' 3rd place solution☆90Updated 10 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 11 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆272Updated 2 years ago
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- Kaggle "Microsoft Malware Classification Challenge". 6th place solution☆27Updated 10 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- ☆12Updated 8 years ago