jinxmirror13 / BETH_Dataset_AnalysisLinks
☆15Updated 3 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below
Sorting:
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- ☆7Updated 5 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated last year
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- Implementation of reinforcement learning algorithms in a cyber security simulation. Autonomous and Adaptive Systems (University of Bologn…☆9Updated 4 years ago
- Adversarial Malware Generator Using GANs☆54Updated last year
- ☆32Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆13Updated 5 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆47Updated 9 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆9Updated last year
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆13Updated 11 months ago
- ☆16Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- ☆13Updated 11 months ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆129Updated 2 weeks ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- ☆79Updated 5 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆49Updated 3 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆25Updated 4 years ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆36Updated 11 months ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- A logic-based enterprise network security analyzer☆126Updated 2 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆17Updated 2 weeks ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated 2 months ago