Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras
☆20Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for tensorflow-insiderthreat
Users that are interested in tensorflow-insiderthreat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆147Nov 17, 2020Updated 5 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- 科研日志模板☆15May 8, 2025Updated 11 months ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- Implementation of algorithms proposed by [Huang and Kasiviswanathan]☆16Jul 27, 2016Updated 9 years ago
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Implementation of feature engineering from Feature engineering strategies for credit card fraud☆44Dec 15, 2020Updated 5 years ago
- ☆28Mar 31, 2023Updated 3 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 3 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- 云梭生产运营管理系统,作为工厂的“智能中枢”,负责精确调度与优化整个生产流程的各个环节。想象一下,一个工厂里有各种各样的机器和工人,他们需要按照一定的顺序和规则来工作,以确保生产出来的产品质量好、效率高。MOM系统就像是这个工厂的“总调度员”,它告诉机器何时开始工作、何时休…☆20Mar 8, 2026Updated last month
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Feb 7, 2023Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- A template to make injected DLLs for modding☆11Dec 17, 2020Updated 5 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Mar 5, 2021Updated 5 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- 🎨 A simple beautiful LaTeX theme for books, thesis, note.☆23Feb 22, 2022Updated 4 years ago
- ☆13Dec 21, 2020Updated 5 years ago
- Creating a resource to help build and manage an Insider Threat program.☆101Jan 30, 2025Updated last year
- ☆17Apr 3, 2020Updated 6 years ago