EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250
☆18Mar 12, 2025Updated last year
Alternatives and similar repositories for eagle-eye
Users that are interested in eagle-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 22, 2021Updated 4 years ago
- Notifications made easy for backend and frontend developers☆14Dec 8, 2022Updated 3 years ago
- Pseudo random image generator☆12Jul 24, 2019Updated 6 years ago
- Created a Realtime Sentiment Analysis Social Media Monitoring Using Machine Learning and Web Scraping of Any Brand.☆17Feb 28, 2026Updated last month
- Orthrus PIDS (USENIX Sec'25) official code☆38Feb 11, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Implementation of the methods described in our paper "Explicit Planning Helps Language Models in Logical Reasoning"☆23Apr 12, 2023Updated 3 years ago
- ☆32Jul 21, 2025Updated 8 months ago
- ☆28Jan 30, 2026Updated 2 months ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- I have made a Mini compact Radar with display for that I have used HC-SR04 ultrasonic sensor, this sensor emit ultrasonic sound which cam…☆16Mar 3, 2019Updated 7 years ago
- ☆18Jul 20, 2025Updated 8 months ago
- annotated dataset of cyber-security related tweets☆22May 10, 2021Updated 4 years ago
- ☆25Dec 4, 2020Updated 5 years ago
- Hyperledger fabric 1.1 java SDK compatible with android (API 24+)☆15Apr 24, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Quản Lý Thư Viện sử dụng JSP/Servlet theo mô hình MVC!☆12Mar 16, 2021Updated 5 years ago
- Automatic support for (Claude) Skills for any coding agent that supports AGENTS.md☆31Feb 7, 2026Updated 2 months ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- A collection of curated instructions and projects rules for your AI-powered IDE tools.☆14Mar 24, 2025Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- PathFinder is a tool designed to visualize call graphs of source code.☆14Dec 3, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The repository is dedicated to Evasion Generative Adversarial Network source code.☆16Jun 9, 2022Updated 3 years ago
- The first part of a 2 part end-to-end devops project that incorportaes gitops practices in building pipelines for continuous integration …☆23Feb 11, 2024Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆22May 17, 2018Updated 7 years ago
- Fundamental analog circuit designs to kick start and embark the journey in the world of IC design.☆33Aug 31, 2023Updated 2 years ago
- Channels v3 Multiplerxer☆33Jul 20, 2024Updated last year
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Companion code for "Uncertainty-Driven Active Vision for Implicit Scene Reconstruction". This repository contains the code base for a Nex…☆33Oct 13, 2022Updated 3 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- Run TTPs, with AI!☆125Feb 23, 2026Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- ☆30Oct 27, 2025Updated 5 months ago