Malicious domain name detection based on tensorflow
☆36Jan 6, 2018Updated 8 years ago
Alternatives and similar repositories for domain_malicious_detection
Users that are interested in domain_malicious_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Apr 11, 2021Updated 5 years ago
- AIOps学习资料汇总,欢迎一起补全这个仓库,欢迎star☆14Aug 25, 2022Updated 3 years ago
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- ☆14Oct 28, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This System Contains The Full Project of Phishing Website Detection with the GUI☆13Dec 29, 2023Updated 2 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- ☆18Feb 2, 2023Updated 3 years ago
- ☆32Sep 12, 2021Updated 4 years ago
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆14Mar 26, 2014Updated 12 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- Stata implementation of the Friedman, Hastie and Tibshirani (2010, JStatSoft) coordinate descent algorithm for elastic net regression☆15Nov 26, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆17Jan 18, 2021Updated 5 years ago
- For paper Container-IMA: https://www.usenix.org/system/files/raid2019-luo.pdf☆12Mar 12, 2020Updated 6 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated 2 years ago
- docker学习,参考b战 遇见狂神说☆14Apr 1, 2022Updated 4 years ago
- 这是一款适用于Ubuntu(基于12.04)系统的操作系统测评软件,名为乐测评, 主要对系统进行如下六个方面的性能检测:CPU、内存、磁盘&IO、网络、开机速度、系统安全,软硬件方 面都会进行较全面的检测。每个方面先检测操作系统基本信息,让用户对自己的系统有个基本了解。然后…☆17Mar 25, 2017Updated 9 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- A Docker based Honey Pot☆17Oct 3, 2018Updated 7 years ago
- Code and data for the USENIX 2025 paper "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating…☆28Aug 12, 2025Updated 9 months ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Oct 24, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- a docker container behavior monitoring tool based on eBPF☆17Jul 22, 2023Updated 2 years ago
- LSTM,TextCNN,fastText情感分析,模型用 tf_serving 和 flask 部署成web应用☆43Sep 15, 2019Updated 6 years ago
- Research on cybersecurity data usage in research papers☆15Dec 15, 2017Updated 8 years ago
- 公司需要一个微信群发助手,利用django + itchat 开发了界面版的微信群发助手。☆15Sep 26, 2019Updated 6 years ago
- 毕业生离校管理系统☆10Feb 22, 2023Updated 3 years ago
- OpenStack Swift protocol implementation used in Cyberduck☆24Apr 28, 2026Updated 3 weeks ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- A repository for Stata modules that I develop.☆23Oct 6, 2022Updated 3 years ago
- Focus on ICS, providing the latest ICS consulting, research, services(专注工控网络安全,提供最新的工控网络安全咨询、研究、服务)☆19Mar 17, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- ☆22Mar 25, 2019Updated 7 years ago
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆93Dec 8, 2022Updated 3 years ago
- 使用LSTM对股票价格进行回归预测,对股价涨跌进行分类预测。We use LSTM to forecast the stock price and classify the rise and fall of the stock price.☆17Jun 18, 2020Updated 5 years ago
- dataSet for kubAnomaly model☆20Mar 24, 2023Updated 3 years ago
- This is the historical location of Swauth; active development is now at https://github.com/openstack/swauth☆44Nov 16, 2015Updated 10 years ago
- Speaker-listener Label Propagation Algorithm Implemented in Python☆15Oct 31, 2013Updated 12 years ago