ejooco / computer_network_visualisationLinks
Using Dash Cytoscape to visualise networks from a packet capture
☆12Updated 3 years ago
Alternatives and similar repositories for computer_network_visualisation
Users that are interested in computer_network_visualisation are comparing it to the libraries listed below
Sorting:
- Browser-based visualization tool that uses JSON and an interactive enclosure diagram to visualize networks.☆60Updated 3 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 9 years ago
- Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.☆83Updated 5 years ago
- Data Analysis on my Google Location History data☆26Updated 2 years ago
- One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and sta…☆156Updated last month
- Predict whether internet traffic is malicious given historical router traffic data☆35Updated 5 years ago
- Machine learning plugins for network traffic☆125Updated 2 years ago
- Collection of cyber security and "AI" relevant topics☆73Updated 8 years ago
- Python API for generating Analyst's Notebook (ANB) ANX files.☆29Updated 2 years ago
- A platform built for easy-to-use automated network traffic analysis☆60Updated 3 years ago
- The code used in the "Don't @ Me: Hunting Twitter Bots at Scale" Black Hat presentation☆152Updated 5 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Updated 4 years ago
- ☆18Updated 6 years ago
- Machine Learning for Computer Security☆281Updated 4 years ago
- Citizen Lab Malware Reports☆279Updated 5 years ago
- ☆299Updated last year
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 8 years ago
- ☆16Updated 9 years ago
- This contains the data for our story "Who Is Collecting Data from Your Car?".☆44Updated 3 years ago
- DNS delegation path traceroute☆12Updated 9 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Updated 4 months ago
- An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.☆227Updated last year
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 7 years ago
- Archive of OCR'd tweets from Cesar Sayoc - A.K.A. the "MAGA bomber"☆10Updated 7 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Updated 8 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Updated 5 years ago