chwress / saladLinks
A Content Anomaly Detector based on n-Grams
☆24Updated 9 years ago
Alternatives and similar repositories for salad
Users that are interested in salad are comparing it to the libraries listed below
Sorting:
- A Tool for Measuring String Similarity☆118Updated 6 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- A twitter streaming library built on tweepy that enables dynamic term tracking☆52Updated last month
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 9 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Updated 8 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 11 years ago
- ☆62Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 8 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- ☆12Updated 8 years ago
- Extract cyber security entities from unstructured text☆34Updated 8 years ago
- Package to facilitate URL clustering☆71Updated 9 years ago
- Extract relationships between cyber security entities within unstructured text☆24Updated 7 years ago
- Simple clustering library for python.☆66Updated 5 years ago
- Small python library to create semantic graphs in JSON.☆94Updated 9 years ago
- ☆32Updated 8 years ago
- ☆33Updated 9 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Repo for CS 259D: Data Mining for Cyber Security☆18Updated 11 years ago
- A collection of documents and materials for the EMNLP-2015 Semantic Similarity tutorial☆30Updated 10 years ago
- Code and Presentation slides for Teaching the Elephant to Read☆17Updated 9 years ago
- Spiders a website using the darknet via Tor☆12Updated 8 years ago
- The User Activity Logging Engine, or User-ALE, is a logging mechanism used to quantitatively assess the behavioural and cognitive state o…☆13Updated 9 years ago
- Aperture-Tiles uses familiar web-based map interactions to allow exploration of arbitrary huge data sets.☆74Updated 2 years ago
- Ipython notebook that illustrates effectiveness of machine learning algorithms in anomaly detection of netflow data (inbound/outbound DDo…☆79Updated 8 years ago
- Security log file challenge☆28Updated 9 years ago
- Multi-layer Recurrent Neural Networks (LSTM, GRU, RNN) for word-level language models in Torch☆27Updated 9 years ago
- Identifies phishing websites using a treebag model☆22Updated 5 years ago