chstan / CS259D
Repo for CS 259D: Data Mining for Cyber Security
☆18Updated 10 years ago
Alternatives and similar repositories for CS259D:
Users that are interested in CS259D are comparing it to the libraries listed below
- code for kaggle competition Microsoft malware classification☆41Updated 9 years ago
- security machine learning☆72Updated 7 years ago
- 第三届阿里云安全算法挑战赛☆37Updated last year
- ☆62Updated 7 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- ☆11Updated 7 years ago
- Kaggle "Microsoft Malware Classification Challenge". 6th place solution☆27Updated 9 years ago
- Sample DGA classifier☆124Updated 9 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆71Updated 6 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- ☆12Updated 7 years ago
- dns tunnel dectect with CNN☆62Updated 5 years ago
- public database for research☆17Updated 7 years ago
- word2vec variations☆8Updated 7 years ago
- 第三届阿里云算法赛_i_hate_mcdonalds团队_解决方案☆56Updated 6 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 9 years ago
- record and share my reading everyday☆11Updated 8 years ago
- 滴滴黑产识别的离群点检测python自用包☆42Updated 5 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆78Updated 10 years ago
- https://www.kaggle.com/c/avito-context-ad-clicks/forums☆84Updated 9 years ago
- ☆33Updated 8 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆19Updated 8 years ago
- Kaggle 'Microsoft Malware Classification Challenge' 3rd place solution☆90Updated 9 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Kaggle微软恶意代码分类☆152Updated 4 years ago
- Predicting job salaries from ads - a Kaggle competition☆55Updated 10 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Structural Analysis and Detection of Android Malware☆78Updated 7 months ago