Security Analytics UoM - COMP90073 - S2 2020
☆10Oct 1, 2021Updated 4 years ago
Alternatives and similar repositories for Project-2-COMP90073-Machine-learning-based-cyberattack-detection
Users that are interested in Project-2-COMP90073-Machine-learning-based-cyberattack-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A system that turns jailbreak papers into runnable attacks and benchmarks — live, as research evolves.☆24Mar 12, 2026Updated 2 weeks ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆79Apr 3, 2021Updated 4 years ago
- A Repo to keep the CyberSecurity-IIITA projects☆17Aug 9, 2017Updated 8 years ago
- Machine learning based cyber attack detection in network traffic.☆14Dec 14, 2020Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- A background service designed for printers with continuous ink systems. Aims to prevent the ink from drying out by printing automatically…☆19Oct 14, 2025Updated 5 months ago
- Sign language recognition, using multihand tracking solution from Mediapipe, along with Speech recognition and Text to Speech to deliver …☆12May 20, 2021Updated 4 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- A Python implementation of STFT and MFCC audio features from scratch☆16Jun 25, 2020Updated 5 years ago
- E-commerce businesses are always striving to provide personalized experiences to their customers to increase engagement and loyalty. One …☆10May 26, 2023Updated 2 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- 自制的北邮本科毕设答辩ppt模板☆22Nov 21, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 电子白板系统,通过canvas绘制文字,图片,矩形,画笔path等。支持画布的拖拽☆16May 10, 2018Updated 7 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- this repo for cyberSecurity and ethical hacking books,projects,articles etc☆44Apr 18, 2024Updated last year
- This repository collects lecture notes on Cryptography that are publicly accessible.☆28Jan 25, 2022Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ☆10Aug 8, 2025Updated 7 months ago
- ☆17Oct 29, 2017Updated 8 years ago
- ☆13Apr 17, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fake News Detection☆11Dec 25, 2018Updated 7 years ago
- ☆15Jan 9, 2023Updated 3 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Ethereum smart contract website example with backend test scripts.☆17Mar 10, 2026Updated 2 weeks ago
- Projects related to Information security/Cyber security/Cryptography☆30Dec 15, 2023Updated 2 years ago
- The primary objective of this project is to build a Real-Time Gesture Recognition Model. This model can be proposed as a baseline model f…☆14Jan 1, 2022Updated 4 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Sep 14, 2025Updated 6 months ago
- ☆14Oct 14, 2025Updated 5 months ago
- an improvement of the paper: Learning to Detect Violent Videos using Convolution LSTM☆11Jun 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The mobile version for the food dashboard tutorials☆14Apr 14, 2021Updated 4 years ago
- Some materials or answers of courses in UoM☆12Nov 13, 2018Updated 7 years ago
- A Flutter application with the GetX framework, Node.js backend, Typescript, and MongoDB database for sharing notes between teachers and s…☆11Apr 10, 2025Updated 11 months ago
- Machine Learning for Cyber Security☆48Dec 25, 2019Updated 6 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- ☆23May 17, 2023Updated 2 years ago
- Cryptographic Anonymized Online Voting System☆23Oct 29, 2023Updated 2 years ago