A Python implementation of the non_iid tests in SP800-90B.
☆13Aug 2, 2021Updated 4 years ago
Alternatives and similar repositories for SP800_90b_tests
Users that are interested in SP800_90b_tests are comparing it to the libraries listed below
Sorting:
- The source codes of the SWAN cipher☆11Oct 5, 2019Updated 6 years ago
- The SP800-90B_EntropyAssessment C++package implements the min-entropy assessment methods included in Special Publication 800-90B.☆241May 27, 2025Updated 9 months ago
- A python implementation of the SP800-22 Rev 1a PRNG test suite.☆167May 31, 2021Updated 4 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Programs and data to accompany the book "Random Number Generators, Principles and Practices"☆11Oct 5, 2018Updated 7 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Pandas中文教程☆10Jul 4, 2020Updated 5 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- ☆11Dec 29, 2022Updated 3 years ago
- Post-quantum Cryptography VPN (openvpn subproject)☆14Sep 4, 2020Updated 5 years ago
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- 《统计学习方法_李航》每章算法的具体实现(不依赖与其他库)☆11Feb 20, 2017Updated 9 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- This project consists of implementations of several kNN algorithms for road networks (aka finding nearest points of interest) and the exp…☆11Apr 30, 2024Updated last year
- FEM micromagnetic simulator☆11Updated this week
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- Simple MATLAB toolbox for deep learning network: Version 1.0.3☆16Apr 16, 2019Updated 6 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- [ICLR 2026] The official implementation of the paper "MLP Memory: A Retriever-Pretrained Memory for Large Language Models".☆49Jan 28, 2026Updated last month
- ☆13Dec 30, 2021Updated 4 years ago
- ☆11Feb 8, 2026Updated 3 weeks ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆16Oct 5, 2024Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- Recurrent Neural Networks With Limited Numerical Precision☆13May 25, 2017Updated 8 years ago