dleyanlin / Machine-Learning-and-Cyber-Security-ResourcesLinks
☆15Updated 8 years ago
Alternatives and similar repositories for Machine-Learning-and-Cyber-Security-Resources
Users that are interested in Machine-Learning-and-Cyber-Security-Resources are comparing it to the libraries listed below
Sorting:
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 11 months ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- Experiments to detect phishing websites using neural networks☆22Updated 5 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆195Updated 2 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆34Updated 7 years ago
- A list of cybersecurity projects that use machine learning techniques☆63Updated 8 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆58Updated last year
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆25Updated last year
- Zero Trust Agent☆24Updated last month
- Rank the pages in the corpus by considering the inlinks and outlinks. Also handling dead ends and spider traps. Topic Specific Page Rank …☆10Updated 7 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Collection of cyber security and "AI" relevant topics☆74Updated 7 years ago
- ☆51Updated 9 years ago
- Machine learning plugins for network traffic☆126Updated last year
- TensorFlow materials☆13Updated 4 years ago
- A repository that contains links and information for acquisitions and potential acquisitions that have arisen out of work between the CoE…☆11Updated 5 years ago
- Examples scripts that showcase how to use Private AI Text to de-identify, redact, hash, tokenize, mask and synthesize PII in text.☆82Updated 2 months ago
- Neo4j Cybersecurity Demo☆18Updated 3 years ago
- Library for identification, anonymization and de-anonymization of PII data☆22Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- A fast and flexible graph theory library.☆8Updated 4 years ago
- SSH traffic analysis☆23Updated 6 years ago
- A statistical framework for graph anomaly detection.☆17Updated 6 years ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆25Updated 6 months ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆49Updated 7 months ago
- Model explanation provides the ability to interpret the effect of the predictors on the composition of an individual score.☆13Updated 4 years ago