using Drebin dataset to distinguish between malwares and not malwares
☆13Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- Dataset created for the Power Line Insulators Inspection Detections☆10Jul 2, 2020Updated 5 years ago
- CNN based android malware detection system☆22Aug 12, 2019Updated 6 years ago
- Android Malware detection using Deep Learning Hybrid Model.☆24Mar 28, 2018Updated 7 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- A practical way to learn Pandas.☆13Aug 11, 2018Updated 7 years ago
- For temperature detection of insulators in Power System☆12Mar 13, 2019Updated 7 years ago
- Teaching material for basic Python bootcamp☆14Sep 30, 2020Updated 5 years ago
- Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions…☆20Mar 6, 2023Updated 3 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- Implementation of Active Anomaly Discovery (AAD) in Python☆15Dec 19, 2017Updated 8 years ago
- 💯后端面试进阶指南☆26Feb 13, 2019Updated 7 years ago
- An end-to-end Ethereum based time locked wallet for depositing and claiming Ether and/or a custom ERC20 token after a certain release tim…☆11Feb 20, 2021Updated 5 years ago
- Detecting Credit Card Fraud by European users in September 2013. Kaggle link: https://www.kaggle.com/dalpozz/creditcardfraud☆10Jan 6, 2017Updated 9 years ago
- A set of pdf documents used during the fuzzing process☆22Apr 27, 2017Updated 8 years ago
- kmeans for YOLO anchors☆13Jun 15, 2018Updated 7 years ago
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 5 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 2 years ago
- my solution for UC Berkeley AI projects pacman☆11Jul 25, 2020Updated 5 years ago
- 计算机应用与编程实践,作业备份,数据量大了是真的恶心。。。☆11Dec 12, 2019Updated 6 years ago
- A Custom 3D Button in Flutter☆20Dec 1, 2019Updated 6 years ago
- Android malware detection using static and dynamic analysis☆39Apr 16, 2019Updated 6 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- ☆16Dec 12, 2014Updated 11 years ago
- 基于卷积神经网络的恶意软件检测方法☆59May 21, 2019Updated 6 years ago
- Team of ChongShi Perception Source Code☆14Aug 26, 2020Updated 5 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- In-BoXBART: Get Instructions into Biomedical Multi-task Learning☆14Aug 23, 2022Updated 3 years ago
- Reading list for multimodal sequence learning☆14Sep 4, 2023Updated 2 years ago
- ☆14Sep 14, 2021Updated 4 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- Cybersecurity Data Mining Competition 2017☆10Jan 19, 2019Updated 7 years ago
- Code for Generalized Zero-Shot Text Classification for ICD Coding (IJCAI 2020)☆17Jul 27, 2020Updated 5 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- ☆17Nov 1, 2023Updated 2 years ago
- init☆13Dec 4, 2024Updated last year
- This is the repository to the article "NEWBEE: A Multi-Modal Gait Database of Natural Everyday-Walk in an Urban Environment", 2022☆11Aug 2, 2022Updated 3 years ago
- ☆24Aug 13, 2018Updated 7 years ago