jinxmirror13 / BETH_Dataset_Analysis
☆14Updated 3 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis:
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below
- Automated Yara Rule generation using Biclustering☆62Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated this week
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 3 years ago
- ☆77Updated 5 years ago
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆20Updated 10 months ago
- Adversarial Malware Generator Using GANs☆52Updated 6 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆18Updated 2 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- Security Weaknesses in Machine Learning☆15Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆42Updated last year
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆43Updated this week
- ☆13Updated 2 years ago
- ☆14Updated 3 years ago
- Pytorch implementation of MalConv☆71Updated 2 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆7Updated 2 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆12Updated last month
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆205Updated last month
- This repository contains scripts and dataset for a Apt Identification Triage System☆14Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- ☆11Updated 5 months ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25Updated 3 years ago
- ☆15Updated 3 years ago