Machine learning on knowledge graphs for context-aware security monitoring (data and model)
☆18Mar 11, 2022Updated 3 years ago
Alternatives and similar repositories for cyberML
Users that are interested in cyberML are comparing it to the libraries listed below
Sorting:
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- A embedding method for Cyber Threat Intelligence☆22Dec 2, 2018Updated 7 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- Exercises Galois theory D. Cox☆12Jun 29, 2023Updated 2 years ago
- ☆90Jan 4, 2023Updated 3 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Security Control Knowledge Graph☆31Apr 24, 2024Updated last year
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆208Apr 28, 2023Updated 2 years ago
- Datasets used in the StreamSpot experiments☆66Feb 18, 2016Updated 10 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- easily parse environment variables☆11Jul 7, 2024Updated last year
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- Implementation of "Federated Full-Parameter Tuning of Billion-Sized Language Models with Communication Cost under 18 Kilobytes" (https://…☆13May 6, 2024Updated last year
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem…☆12Apr 7, 2017Updated 8 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- A Python implementation of improved Label Propagation Algorithm.☆11May 26, 2021Updated 4 years ago
- Explore semantic caching to reduce your OpenAI/LLM API bill☆11Jul 21, 2023Updated 2 years ago
- AI library that makes interfacing with ai easier as well as provide tooling around ai☆16Feb 11, 2026Updated 2 weeks ago
- ☆12Jan 22, 2026Updated last month
- A labeled dataset for domain specific named entity recognition☆13Mar 1, 2022Updated 4 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- ☆11Jul 10, 2022Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Feb 2, 2026Updated 3 weeks ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Repository for UC Santa Cruz's work on Libresoft's CVSAnalY☆15May 13, 2013Updated 12 years ago