RNN implementation with Keras for machine activity data to predict malware
☆43Feb 1, 2024Updated 2 years ago
Alternatives and similar repositories for malware-prediction-rnn
Users that are interested in malware-prediction-rnn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hexo Blog☆10Feb 7, 2025Updated last year
- Malware diversity☆51Dec 2, 2015Updated 10 years ago
- ☆14May 14, 2018Updated 7 years ago
- Malware Classification using Machine learning☆77Nov 9, 2024Updated last year
- ☆13Jun 19, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- Spot malwares using Machine Learning techniques☆52Nov 29, 2019Updated 6 years ago
- ☆13Jun 15, 2025Updated 9 months ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- A Deep Learning Model for detecting Malware Applications☆14Aug 3, 2025Updated 7 months ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- A pure Python ECMAScript parser and engine.☆18Feb 18, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- Detecting Malware in PE files☆27Aug 8, 2023Updated 2 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- Prioritized Sequence Experience Replay☆10Aug 16, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- Demonstrating the usage of FGYM: A Toolkit for benchmarking FPGA-accelerated Reinforcement Learning☆13Aug 12, 2021Updated 4 years ago
- Version 3.0.0 Pytorch implementations of DQN, DDQN, DDPG, SAC, Discrete SAC. With more features :)☆12Feb 16, 2023Updated 3 years ago
- Transactional memory (mostly Intel® TSX) experiments☆14May 3, 2014Updated 11 years ago
- ☆10Jan 31, 2017Updated 9 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Mar 31, 2024Updated last year
- Operating system demonstrating system transactions☆17Apr 19, 2017Updated 8 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated 2 months ago
- Implementation of Oridinal Classification Paper using Logistic Regression and SVM☆12Jun 10, 2017Updated 8 years ago
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 8 years ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- anime face detector and model learner with deep learning.☆15Sep 22, 2015Updated 10 years ago