genimind / cyberanom
Cyber Anomaly Detection using RNN Language model
☆9Updated 6 years ago
Alternatives and similar repositories for cyberanom:
Users that are interested in cyberanom are comparing it to the libraries listed below
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆18Updated 5 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 6 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Updated 4 years ago
- ☆9Updated 7 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- ☆11Updated 7 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- GraphChi's C++ version. Big Data - small machine.☆16Updated 4 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- ☆14Updated 4 years ago
- Corpus of auto-labeled text for the cyber security domain☆93Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆16Updated 2 years ago
- Deep Learning Log Analysis using Pytorch☆9Updated 3 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- ☆77Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆40Updated 4 years ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆16Updated 4 years ago
- ☆14Updated 6 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆22Updated 5 years ago
- Multi-class malware classification using Deep Learning☆77Updated 4 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- A Deep Learning model for business process predictions. Preprint on arXiv: https://arxiv.org/abs/2102.07838☆12Updated 4 years ago
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- ☆21Updated 3 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆40Updated 3 years ago