jinxmirror13 / BETH_Dataset_Analysis
☆14Updated 3 years ago
Alternatives and similar repositories for BETH_Dataset_Analysis:
Users that are interested in BETH_Dataset_Analysis are comparing it to the libraries listed below
- Automated Yara Rule generation using Biclustering☆65Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- ☆21Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated 10 months ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- ☆77Updated 5 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆9Updated 2 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- PDF Malware Parser☆20Updated 8 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 4 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆20Updated 4 years ago
- ☆13Updated 2 years ago
- Adversarial Malware Generator Using GANs☆52Updated 7 months ago
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆42Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆13Updated 2 months ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆35Updated 6 months ago
- Repository of creating different example suricata data sets☆32Updated 6 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆22Updated 11 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆18Updated 2 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆61Updated 4 years ago
- ☆13Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 11 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 7 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆30Updated last month