incertum / cyber-matrix-ai
Collection of cyber security and "AI" relevant topics
☆74Updated 7 years ago
Alternatives and similar repositories for cyber-matrix-ai:
Users that are interested in cyber-matrix-ai are comparing it to the libraries listed below
- Machine learning to classify Malicious (Spam)/Benign URL's☆128Updated 3 years ago
- Malicious Web Sites Detection using Suspicious URL☆73Updated 4 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆34Updated 7 years ago
- ☆55Updated 6 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 4 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆152Updated 6 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 6 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆25Updated 7 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆269Updated 2 years ago
- Free Malware Training Datasets for Machine Learning☆232Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆50Updated 2 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆140Updated 6 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 4 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated last year
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- Uses deep learning and machine learning techniques to detect and classify web pages as spam, malware and phishing☆62Updated 4 years ago
- Experiments to detect phishing websites using neural networks☆21Updated 5 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 10 years ago
- Detection of malicious domains via character co-occurrence analysis in URL's.