crossedbanana / Enron-Email-ClassificationLinks
The project involves a preliminary text process, feature extraction and finally the classifiers to distinguish spam and non-spam emails.
☆17Updated 8 years ago
Alternatives and similar repositories for Enron-Email-Classification
Users that are interested in Enron-Email-Classification are comparing it to the libraries listed below
Sorting:
- Exploring Botnet Detection with Machine Learning☆20Updated 8 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Updated 2 years ago
- detect malicious URL and Request (Bi-LSTM、Bi-LSTM + CNN、CNN + Bi-LSTM、CNN + Bi-LSTM + CNN)☆60Updated 6 years ago
- ☆18Updated 6 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆235Updated 3 years ago
- Time Series Prediction, Stateful LSTM; 时间序列预测,洗发水销量/股票走势预测,有状态循环神经网络☆56Updated 8 years ago
- This repository contains implementation of some techniques like SMOTE, ADASYN, SMOTE + Tomek Links, SMOTE + ENN to overcome class imbalan…☆48Updated 5 years ago
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆17Updated 7 years ago
- Encrypted Traffic classification☆17Updated 6 years ago
- Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the…☆53Updated 3 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Updated last year
- AI deep learning neural network for anomaly detection using Python, Keras and TensorFlow☆229Updated 5 years ago
- ☆23Updated 6 years ago
- ☆26Updated 7 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆41Updated 7 years ago
- Source Code for 'Beginning Anomaly Detection Using Python-Based Deep Learning' by Sridhar Alla and Suman Kalyan Adari☆84Updated 6 years ago
- Prediction of wind turbine power generation from real-time SCADA data☆14Updated 3 years ago
- A Notebook where I implement differents anomaly detection algorithms on a simple exemple. The goal was just to understand how the differ…☆121Updated 8 years ago
- 时间序列ARIMA模型的销量预测☆65Updated 7 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆58Updated 6 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 7 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Updated 5 years ago
- iPython notebook and pre-trained model that shows how to build deep Autoencoder in Keras for Anomaly Detection in credit card transaction…☆579Updated 6 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆75Updated 4 years ago
- Coronavirus disease 2019 (COVID-19) is an infectious disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2).Coron…☆50Updated 5 years ago
- Oversampling for imbalanced learning based on k-means and SMOTE☆130Updated 4 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆174Updated 7 years ago
- This project shows how to perform customers segmentation using Machine Learning algorithms. Three techniques will be presented and compar…☆10Updated 5 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 6 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Updated 6 years ago