hanhanwu / Hanhan_CyberSecurity_DataScienceLinks
Applied data science in cyber security
☆22Updated 3 years ago
Alternatives and similar repositories for Hanhan_CyberSecurity_DataScience
Users that are interested in Hanhan_CyberSecurity_DataScience are comparing it to the libraries listed below
Sorting:
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Machine Learning applied to Cyber Security Course☆44Updated 5 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆194Updated 2 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated this week
- ☆15Updated 8 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆72Updated 4 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆140Updated 6 years ago
- Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.☆83Updated 5 years ago
- ☆70Updated 2 years ago
- Machine-learning-based intrusion detection☆38Updated 6 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- SSH traffic analysis☆23Updated 6 years ago
- A list of cybersecurity projects that use machine learning techniques☆63Updated 8 years ago
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆50Updated 6 years ago
- ☆55Updated 6 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Updated 4 years ago
- ☆50Updated 9 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- This is a paper list about Machine Learning for IDSes☆89Updated 10 months ago
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆18Updated 6 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆52Updated 2 years ago
- ☆52Updated 6 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆156Updated 2 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆126Updated 4 years ago