Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification
☆13Jan 29, 2020Updated 6 years ago
Alternatives and similar repositories for Malware-Classification-with-ML
Users that are interested in Malware-Classification-with-ML are comparing it to the libraries listed below
Sorting:
- android-malware-classification using machine learning algorithms☆11Aug 17, 2020Updated 5 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Malware detection project on Android devices using machine learning classification algorithms.☆78Jun 13, 2017Updated 8 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆74Oct 10, 2016Updated 9 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- Android Malware detection using Deep Learning Hybrid Model.☆24Mar 28, 2018Updated 7 years ago
- Android Malware Detection using Deep Learning☆53Aug 21, 2019Updated 6 years ago
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Apr 2, 2021Updated 4 years ago
- Windows 10 calculator made with JavaScript.☆11May 3, 2020Updated 5 years ago
- Python wrapper to use FlowDroid APK analyzer.☆11Jan 30, 2023Updated 3 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Android malware detection using static and dynamic analysis☆39Apr 16, 2019Updated 6 years ago
- This repository contains code for classification of sound using spectrograms. We train a CNN to classify the sounds after converting to s…☆10Dec 14, 2018Updated 7 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- 📡 📶 Instructions for setting up the Arduino IDE and sample projects for Chinse TTGO ESP32 LORA OLED development board.☆10Aug 12, 2020Updated 5 years ago
- apk加固实现☆12Oct 17, 2019Updated 6 years ago
- Minitorch Self-Study Guide (SAIA)☆11Oct 9, 2022Updated 3 years ago
- ☆11Mar 18, 2021Updated 4 years ago
- Android Clone App Detector☆17Jun 14, 2019Updated 6 years ago
- This is the repository to the article "NEWBEE: A Multi-Modal Gait Database of Natural Everyday-Walk in an Urban Environment", 2022☆11Aug 2, 2022Updated 3 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 8 months ago
- Kubernetes LDAP authentication service written in Go.☆10May 4, 2019Updated 6 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Mar 24, 2023Updated 2 years ago
- A Python wrapper for the updown.io API☆13Oct 17, 2024Updated last year
- A collection of ReactJS exercises samples based on tutorial videos of Udemy's Modern React with Redux course, created by Stephen Grider☆11Jan 7, 2019Updated 7 years ago
- Reading list for multimodal sequence learning☆14Sep 4, 2023Updated 2 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- It is the backend repository of Mobile App enabling MSMEs to track finances and manage accounts and inventory📱☆13Dec 10, 2022Updated 3 years ago
- JPEG Compression using DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) in Matlab.☆10Nov 26, 2019Updated 6 years ago
- ☆14Aug 26, 2018Updated 7 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- OWASP Ukraine 2019 CTF☆12Feb 10, 2023Updated 3 years ago
- This is the official repository for the paper titled "Towards Interpretable Radiology Report Generation via Concept Bottlenecks using a M…☆16Apr 29, 2025Updated 10 months ago