jinxmirror13 / BETH_Dataset_AnalysisLinks
☆17Updated 3 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below
Sorting:
- Malware Bypass Research using Reinforcement Learning☆106Updated last year
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆50Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆219Updated 2 weeks ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆52Updated 2 months ago
- ☆16Updated 4 years ago
- ☆25Updated 4 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆86Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 3 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆52Updated 6 months ago
- ☆13Updated last year
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆24Updated 7 months ago
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆13Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated last year
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆45Updated 10 months ago
- Transformer Neural Network from Dynamic Malware Detection☆37Updated last year
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- ☆79Updated 5 years ago
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆87Updated this week
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆36Updated last year
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 6 years ago
- Automatic Malware Signature Generation Tool☆16Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 6 months ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆27Updated 3 months ago
- An environment for testing AI pentesting agents against a simulated network.☆193Updated last year