chstan / CS259D
Repo for CS 259D: Data Mining for Cyber Security
☆18Updated 10 years ago
Alternatives and similar repositories for CS259D:
Users that are interested in CS259D are comparing it to the libraries listed below
- security machine learning☆72Updated 7 years ago
- ☆62Updated 7 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- code for kaggle competition Microsoft malware classification☆41Updated 9 years ago
- Extract relationships between cyber security entities within unstructured text☆23Updated 6 years ago
- Sample DGA classifier☆124Updated 9 years ago
- dns tunnel dectect with CNN☆62Updated 5 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- ☆11Updated 7 years ago
- My AI security testing projects☆41Updated 6 years ago
- 第三届阿里云算法赛_i_hate_mcdonalds团队_解决方案☆56Updated 6 years ago
- 第三届阿里云安全算法挑战赛☆37Updated last year
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Updated 4 years ago
- ☆32Updated 7 years ago
- public database for research☆17Updated 7 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 9 months ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 10 years ago
- 第二届阿里云安全算法挑战赛☆16Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- 滴滴黑产识别的离群点检测python自用包☆42Updated 5 years ago
- Extract cyber security entities from unstructured text☆33Updated 7 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Classification LSTM RNN for DeepLog realization☆8Updated 6 years ago
- ☆33Updated 8 years ago
- ☆12Updated 7 years ago
- awesome security paper☆155Updated 9 years ago