kandluis / cs155-projects
CS155: Network and Web Security Projects
☆13Updated 2 years ago
Alternatives and similar repositories for cs155-projects:
Users that are interested in cs155-projects are comparing it to the libraries listed below
- All programs and code when I studied Computer Science on UNSA☆9Updated 2 years ago
- Multi-Agent Reinforcement Learning on network-security☆18Updated 2 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 3 years ago
- A logic-based enterprise network security analyzer☆112Updated last year
- ☆18Updated 2 years ago
- ☆30Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Updated 4 years ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Updated last year
- OpenAI Gym environment for binary fuzzing based on afl☆21Updated 6 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆10Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- an implementation of ATOC☆14Updated 3 years ago
- Weakness Identification Research Employing CFG Analysis and Machine Learning☆9Updated 6 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆29Updated 6 years ago
- A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions …☆40Updated 3 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆24Updated last year
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆25Updated last month
- ☆11Updated 5 years ago
- ☆31Updated 4 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆20Updated last year
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆12Updated 4 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆12Updated 5 years ago
- Records & Reports for Seed-project☆92Updated 4 years ago
- Intrusion Detection System for IoT Devices☆20Updated 2 years ago
- This is my repo to hack my web app about vulnerability sql injection with python.☆9Updated 2 years ago
- ☆34Updated last week
- Modelling SQL Injection Using Reinforcement Learning☆19Updated 3 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Updated 8 years ago
- NLP model and tech for cyber security tasks☆85Updated last year