incertum / cyber-matrix-ai
Collection of cyber security and "AI" relevant topics
☆74Updated 7 years ago
Alternatives and similar repositories for cyber-matrix-ai:
Users that are interested in cyber-matrix-ai are comparing it to the libraries listed below
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆33Updated 7 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆126Updated 3 years ago
- Malicious Web Sites Detection using Suspicious URL☆73Updated 4 years ago
- ☆55Updated 6 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆48Updated 2 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆81Updated 4 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 4 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆268Updated 2 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆159Updated 6 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 6 years ago
- Free Malware Training Datasets for Machine Learning☆231Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆47Updated 8 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆155Updated last year
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆218Updated 7 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆139Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆168Updated last year
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆152Updated 6 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆361Updated 2 years ago
- AI: Deep Learning for Phishing URL Detection☆48Updated 2 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆157Updated 4 years ago