RNN implementation with Keras for machine activity data to predict malware
☆43Feb 1, 2024Updated 2 years ago
Alternatives and similar repositories for malware-prediction-rnn
Users that are interested in malware-prediction-rnn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Hexo Blog☆10Feb 7, 2025Updated last year
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 8 months ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14May 14, 2018Updated 7 years ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- ☆13Jun 19, 2018Updated 7 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- ☆13Jun 15, 2025Updated 10 months ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- A pure Python ECMAScript parser and engine.☆18Feb 18, 2016Updated 10 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆74Nov 10, 2019Updated 6 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- Detecting Malware in PE files☆28Aug 8, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- A suite of simple programs to test Intels' TSX extension☆14May 13, 2017Updated 8 years ago
- Tools☆13Apr 20, 2023Updated 3 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 4 years ago
- Demonstrating the usage of FGYM: A Toolkit for benchmarking FPGA-accelerated Reinforcement Learning☆13Aug 12, 2021Updated 4 years ago
- Transactional memory (mostly Intel® TSX) experiments☆14May 3, 2014Updated 12 years ago
- ☆10Jan 31, 2017Updated 9 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆93Mar 31, 2024Updated 2 years ago
- Operating system demonstrating system transactions☆17Apr 19, 2017Updated 9 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- ☆17Oct 22, 2020Updated 5 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated 3 months ago
- [NeurIPS 2020] "FracTrain: Fractionally Squeezing Bit Savings Both Temporally and Spatially for Efficient DNN Training" by Yonggan Fu, Ha…☆10Feb 13, 2022Updated 4 years ago
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 9 years ago