Modern water distribution systems rely on computers, sensors and actuators for both monitoring and operational purposes. This combination of physical processes and embedded systems—cyber-physical systems, in short—improves the level of service of water distribution networks but exposes them to the potential threats of cyber attacks. We will be u…
☆22Jan 2, 2019Updated 7 years ago
Alternatives and similar repositories for Cyber-Attack-Prediction
Users that are interested in Cyber-Attack-Prediction are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Deep Learning Project for Traffic Sign Classification☆13Nov 21, 2021Updated 4 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- A bookmark keeper 🔖 inspired by Safari's new look. Simple and easy, built with JS, HTML & CSS.☆11Dec 5, 2020Updated 5 years ago
- epanetCPA is a MATLAB® toolbox for assessing the impacts of cyber-physical attacks on water distribution systems☆23Oct 7, 2020Updated 5 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Simulate general non-equilibrium superconductor/ferromagnet systems via the Usadel diffusion equation☆10Feb 17, 2025Updated last year
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- ☆13Jul 2, 2020Updated 5 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- ☆15Nov 4, 2024Updated last year
- ☆14Jul 14, 2018Updated 7 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 7 months ago
- A robotic arm demo, including high-tech technologies such as cloud, edge, mobile and image/speech recognition...☆16Dec 13, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LightGBM + Optuna: Auto train LightGBM directly from CSV files, Auto tune them using Optuna, Auto serve best model using FastAPI. Inspire…☆35Feb 13, 2022Updated 4 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- ☆12Jun 6, 2023Updated 2 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Honeypot framework for UPnP Device☆15Feb 2, 2019Updated 7 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- ☆16Nov 8, 2019Updated 6 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- ☆12Aug 22, 2019Updated 6 years ago
- Collection of peer-reviewed Digital Twins developed at the University of Birmingham in partnership with industrial collaborators.☆20Jul 24, 2024Updated last year
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Implementation of Accurate Protein Structure Prediction by Embeddings and Deep Learning Representations☆24Feb 20, 2020Updated 6 years ago
- ☆21Sep 6, 2019Updated 6 years ago
- Package wrote python to solve dynamic Stackelberg game with constraints. Based on ECC 2019 accepted paper titled "Linear quadratic Stacke…☆14Jun 4, 2019Updated 6 years ago