covert-labs / covert-labs.github.ioLinks
Covert.io blog
☆11Updated last year
Alternatives and similar repositories for covert-labs.github.io
Users that are interested in covert-labs.github.io are comparing it to the libraries listed below
Sorting:
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Updated 8 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Predict whether internet traffic is malicious given historical router traffic data☆35Updated 4 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Updated 9 years ago
- A statistical framework for graph anomaly detection.☆17Updated 6 years ago
- Kaggle "Microsoft Malware Classification Challenge". 6th place solution☆27Updated 10 years ago
- Domain name classifier looking for good vs. possibly malicious providers☆33Updated 7 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 10 years ago
- ☆11Updated 7 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆34Updated 7 years ago
- A Python interface to the Feature Selection Toolkit, contains JMI, BetaGamma, CMIM, CondMI, DISR, ICAP, and mRMR☆19Updated 10 years ago
- ☆15Updated 8 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago
- ☆32Updated 7 years ago
- Implementation of unsupervised feature selection algorithm proposed by [Huang, et al. 2015]☆10Updated 9 years ago
- Model explanation provides the ability to interpret the effect of the predictors on the composition of an individual score.☆13Updated 4 years ago
- The Elastic Security Research team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articul…☆9Updated 3 years ago
- Performs user classification into labels using a set of seed Twitter users with known labels and the structure of the interaction network…☆10Updated 8 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- Python, Tor, Stem, Privoxy crawler of web site(s).☆12Updated 10 years ago
- Repo for CS 259D: Data Mining for Cyber Security☆18Updated 10 years ago
- A project that implements statistical methods for identifying anomalous files☆22Updated 10 years ago
- ☆30Updated 7 years ago
- A abstract text classification library using language models. Build your fine-tuned text classifier in 5 steps.☆10Updated 4 years ago
- Size of datasets used for analytics based on 10 years of surveys by KDnuggets.☆16Updated 9 years ago
- ☆15Updated 3 years ago
- Predicting sales with Pandas☆15Updated 9 years ago
- A preprocessor module for Snort that uses ML algorithms for pruning, clustering and finding correlation between alerts☆31Updated 6 years ago
- repair classifiers with disparate impact☆10Updated 6 years ago