fabriciojoc / ml-cybersecuritiy-course
Machine Learning applied to Cyber Security Course
☆43Updated 5 years ago
Alternatives and similar repositories for ml-cybersecuritiy-course:
Users that are interested in ml-cybersecuritiy-course are comparing it to the libraries listed below
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- Malware - Machine Learning☆10Updated 7 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- My notes on various topics☆64Updated last year
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- ☆22Updated 3 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆20Updated last week
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆192Updated 2 years ago
- Malware Data Science Reading Diary / Notes☆127Updated 5 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Static malware analysis using python☆12Updated 6 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆152Updated 6 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- Applied data science in cyber security☆22Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- Experiments to detect phishing websites using neural networks☆21Updated 5 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated this week
- ☆35Updated 3 weeks ago