jinxmirror13 / BETH_Dataset_AnalysisLinks
☆15Updated 3 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below
Sorting:
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆13Updated 9 months ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆45Updated 8 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆47Updated this week
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆127Updated 3 weeks ago
- Automated Yara Rule generation using Biclustering☆67Updated 4 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆34Updated last week
- ☆24Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆64Updated last year
- ☆13Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆17Updated last month
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last month
- Adversarial Malware Generator Using GANs☆54Updated 11 months ago
- ☆16Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 2 months ago
- ☆79Updated 5 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆47Updated last month
- ☆13Updated 2 years ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆36Updated 9 months ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆17Updated 3 months ago