jinxmirror13 / BETH_Dataset_AnalysisLinks
☆15Updated 3 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below
Sorting:
- ☆13Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 5 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- A statistical framework for graph anomaly detection.☆17Updated 6 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆43Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- ☆13Updated 10 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆6Updated 4 years ago
- A preprocessor module for Snort that uses ML algorithms for pruning, clustering and finding correlation between alerts☆31Updated 6 years ago
- ☆16Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆68Updated 4 years ago
- ☆11Updated 3 years ago
- Adversarial Malware Generator Using GANs☆54Updated 11 months ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Updated 6 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- ☆79Updated 5 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆46Updated 9 months ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆35Updated 3 weeks ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆10Updated 3 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆16Updated 2 years ago
- ☆15Updated 3 years ago
- Pytorch implementation of MalConv☆71Updated 3 years ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆47Updated 2 weeks ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 2 months ago