Applied data science in cyber security
☆23Mar 21, 2022Updated 3 years ago
Alternatives and similar repositories for Hanhan_CyberSecurity_DataScience
Users that are interested in Hanhan_CyberSecurity_DataScience are comparing it to the libraries listed below
Sorting:
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Feb 15, 2022Updated 4 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Multi-Agent LLM System for Digital Scam Protection☆12Dec 19, 2024Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Evolutionary Game Theory Simulator☆10Jun 8, 2018Updated 7 years ago
- A Swift Router Framework☆12Aug 18, 2018Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Minimal typescript template to build an mcp server☆14May 4, 2025Updated 9 months ago
- This uses HydroSphere to expose a Python machine learning preventive maintenance model for truck brake maintenance☆17Jan 23, 2026Updated last month
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Swift Implementation of the Model Context Protocol (MCP) Spec☆10Mar 28, 2025Updated 11 months ago
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- Creates flow charts from Objective-C source code☆14Jul 18, 2011Updated 14 years ago
- javascript multivariate data visualization☆14Jan 10, 2017Updated 9 years ago
- ☆18Dec 9, 2013Updated 12 years ago
- Predicting Supply Chain Risks Using Machine Learning: The Trade-off Between Performance and Interpretability - Supplementary Material☆14Mar 8, 2019Updated 6 years ago
- Qubic Lite Reference Implementation (ql-node software)☆10Sep 22, 2018Updated 7 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Specification 1 (hierarchical style) for an agentic software development crew, for implementation with mainstream Agentic platforms like…☆23Feb 11, 2026Updated 2 weeks ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- A custom frequency encoder for the HTM, an AI algorithm by @numenta.☆11Mar 17, 2017Updated 8 years ago
- The companion project for the Tuts+ tutorial "Using the Speech Recognition API in iOS 10".☆11Jan 20, 2017Updated 9 years ago
- Awesome Libs app☆11Jan 30, 2021Updated 5 years ago
- Forecasting and anomaly detection of gas consumption☆10Aug 10, 2017Updated 8 years ago
- a fuzzy expert system for auto-tuning PID algorithm☆12Mar 6, 2019Updated 6 years ago
- CS234 Project, Winter 2019☆10Mar 20, 2019Updated 6 years ago
- Some Monte Carlo algorithms for the estimation of small probabilities associated with rare events☆11Aug 16, 2023Updated 2 years ago
- A an ERC20 token backed by carbon credits - allows certified issuance, transfer and retirement☆13Nov 30, 2019Updated 6 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Microsoft Graph CLI - Mail, Calendar, OneDrive, To-Do, Contacts☆48Jan 26, 2026Updated last month
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- A machine-readable constitution for AI — Soul’s creativity hardened into ÆON☆15Sep 14, 2025Updated 5 months ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year