using Drebin dataset to distinguish between malwares and not malwares
☆13Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- Drebin - NDSS 2014 Re-implementation☆107Dec 20, 2017Updated 8 years ago
- Unsupervised Speaker Clustering & Speaker Recognition☆13Jan 7, 2019Updated 7 years ago
- Re-implementation for paper 'Semi-supervised learning with deep generative models' using lasagne. There is no guarantee for bug free.☆14Jul 3, 2021Updated 4 years ago
- UC Berkeley Masters of Information & Data Science | W266 Natural Language Processing with Deep Learning Group Project | Team: Cyprian Gas…☆16Dec 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆14Aug 24, 2019Updated 6 years ago
- Multi-objective reinforcement learning for covid-19 control☆12Aug 12, 2021Updated 4 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆150Nov 21, 2023Updated 2 years ago
- ☆14Apr 10, 2024Updated 2 years ago
- For temperature detection of insulators in Power System☆12Mar 13, 2019Updated 7 years ago
- 💯后端面试进阶指南☆26Feb 13, 2019Updated 7 years ago
- A set of pdf documents used during the fuzzing process☆23Apr 27, 2017Updated 9 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of awesome malware analysis tools and resources☆16Mar 14, 2018Updated 8 years ago
- Code of our IJCAI2021 paper: "Learning Class-Transductive Intent Representations for Zero-shot Intent Detection"☆15Sep 10, 2021Updated 4 years ago
- my solution for UC Berkeley AI projects pacman☆11Jul 25, 2020Updated 5 years ago
- 计算机应用与编程实践,作业备份,数据量大了是真的恶心。。。☆11Dec 12, 2019Updated 6 years ago
- Docker container anomaly detection☆12Sep 30, 2015Updated 10 years ago
- Android malware detection using static and dynamic analysis☆41Apr 16, 2019Updated 7 years ago
- ☆12Sep 9, 2016Updated 9 years ago
- ☆16Dec 12, 2014Updated 11 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GRIN is a proposed standard graph retrieval interface in GraphScope.☆16Mar 25, 2024Updated 2 years ago
- ☆13Feb 24, 2025Updated last year
- docker websocket client for remote attch☆10Apr 23, 2015Updated 11 years ago
- In-BoXBART: Get Instructions into Biomedical Multi-task Learning☆15Aug 23, 2022Updated 3 years ago
- Reading list for multimodal sequence learning☆14Sep 4, 2023Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- ☆26Dec 12, 2018Updated 7 years ago
- A collection of pwn execrise☆28Oct 31, 2019Updated 6 years ago
- The Main Aim of this project is to segment and cluster an audio sample based on speaker when number of speakers are not known before hand…☆25Jan 25, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cybersecurity Data Mining Competition 2017☆10Jan 19, 2019Updated 7 years ago
- Speech recognition with federated learning☆11Jan 9, 2020Updated 6 years ago
- Minitorch Self-Study Guide (SAIA)☆12Oct 9, 2022Updated 3 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- Intrusion Detection Systems (IDS)☆11Aug 18, 2015Updated 10 years ago
- ☆25Aug 8, 2025Updated 9 months ago
- ☆17Nov 1, 2023Updated 2 years ago