norbertFejer / AFE_Project
Automatic Feature Extraction Using Deep Neural Models
☆10Updated 4 years ago
Related projects: ⓘ
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆53Updated last year
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆16Updated 5 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆18Updated 9 months ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆11Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 2 years ago
- ☆15Updated 7 years ago
- ☆15Updated 2 years ago
- Deep distance-based outlier detection published in KDD18: Learning representations specifically for distance-based outlier detection. Few…☆47Updated 3 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆30Updated 4 years ago
- NLP model and tech for cyber security tasks☆77Updated last year
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆33Updated 6 years ago
- Experiments to detect phishing websites using neural networks☆18Updated 4 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆30Updated 2 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆40Updated 3 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆32Updated 11 months ago
- Comparison of Apriori and FP-Growth Algorithm in accuracy metrics, execution time and memory usage for a prediction system of dengue.☆30Updated 6 years ago
- ☆55Updated 6 years ago
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆44Updated 5 years ago
- SSH traffic analysis☆22Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆15Updated 2 years ago
- ☆22Updated 2 years ago
- Multi-class malware classification using Deep Learning☆72Updated 3 years ago
- Python implementation of MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams☆38Updated 2 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆44Updated 2 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆108Updated 8 months ago
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆59Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆13Updated last year
- Explaining Anomalies Detected by Autoencoders Using SHAP☆28Updated 4 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆95Updated 4 years ago