incertum / cyber-matrix-ai
Collection of cyber security and "AI" relevant topics
☆75Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for cyber-matrix-ai
- Machine learning to classify Malicious (Spam)/Benign URL's☆126Updated 3 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆33Updated 6 years ago
- A Dataset for the task of Malicious URL Detection☆20Updated 6 years ago
- Malicious Web Sites Detection using Suspicious URL☆72Updated 4 years ago
- Short Course - Applied Machine Learning for Security Informatics☆57Updated 8 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆46Updated last year
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- ☆55Updated 6 years ago
- ☆53Updated 6 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆53Updated 7 years ago
- An anomaly-based intrusion detection system.☆80Updated last year
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 4 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Updated 8 years ago
- A collection of resources for security data☆40Updated 6 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆130Updated 9 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆150Updated 5 years ago
- ☆36Updated 6 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆265Updated 2 years ago
- Detecting malicious URLs using Machine Learning☆29Updated 6 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆43Updated 7 years ago
- Machine Learning for Phishing Website Detection☆54Updated 4 years ago
- Malware detection project on Android devices using machine learning classification algorithms.☆73Updated 7 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆155Updated 2 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Experiments to detect phishing websites using neural networks☆18Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- AI: Deep Learning for Phishing URL Detection☆48Updated last year
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 6 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆153Updated last year