chwress / salad
A Content Anomaly Detector based on n-Grams
☆22Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for salad
- A Tool for Measuring String Similarity☆116Updated 5 years ago
- A Simple Network Stream Recorder☆35Updated 5 years ago
- A Tool for Embedding Strings in Vector Spaces☆58Updated 5 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆19Updated 8 years ago
- ☆12Updated 7 years ago
- Fast ssdeep comparison library☆12Updated 10 years ago
- Simple clustering library for python.☆65Updated 3 years ago
- Realtime and Online Model Development Framework☆27Updated 7 years ago
- encoding format, library, and utilities for passive DNS data☆26Updated 7 months ago
- A project that implements statistical methods for identifying anomalous files☆22Updated 9 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 7 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆29Updated last year
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 7 years ago
- Fast multipattern regular expression searching for digital forensics☆17Updated 5 years ago
- ☆33Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated last year
- MITIE: library and tools for information extraction☆29Updated 9 years ago
- Domain name classifier looking for good vs. possibly malicious providers☆33Updated 6 years ago
- Temporal Anomaly Detector (TAD)☆14Updated 7 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- Tutorial: Statistical Relational Learning with Google TensorFlow☆40Updated 8 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated last year
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30Updated 5 years ago
- Security log file challenge☆28Updated 8 years ago
- Code for generating analyses found in "Analyzing Log Analysis: An Empirical Study of User Log Mining" to appear in LISA 2014.☆8Updated 9 years ago