Using machine learning and the Global Terrorism Database to predict terrorist attacks
☆37Sep 10, 2015Updated 10 years ago
Alternatives and similar repositories for predicting-terrorist-attacks
Users that are interested in predicting-terrorist-attacks are comparing it to the libraries listed below
Sorting:
- Capture Django HTTP requests & responses for debugging☆14May 16, 2017Updated 8 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- Content based Recommender System which implements sentiment analysis(Naive Bayes,SVMs) on Amazon product reviews. Built in Python(Beautif…☆10Jan 5, 2015Updated 11 years ago
- Given an MP3 file we attempt to predict it's genre.☆15Aug 24, 2015Updated 10 years ago
- Discover repositories you should be following on Github.☆31Apr 24, 2012Updated 13 years ago
- Web crawler to collect data on ht☆18Nov 27, 2017Updated 8 years ago
- A simple php search engine☆15Jul 30, 2013Updated 12 years ago
- Computes and visualizes the sentiment analysis of tweets of US States in real-time using Storm.☆26Jan 8, 2015Updated 11 years ago
- Start or attach to a process and monitor a customizable set of metrics (CPU, I/O, etc.)☆34Apr 15, 2017Updated 8 years ago
- Hacking Games in a Hacked Game☆29Apr 20, 2015Updated 10 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Lightweight Alignment Based Resolution of Alternative Three Prime Ends☆10Jan 26, 2024Updated 2 years ago
- ☆11Aug 17, 2014Updated 11 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- Code that drives the public web-based tools for the Media Cloud Online News Archive and Directory.☆11Updated this week
- ☆10Oct 8, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- High Scale Digital Asset Exchange☆10Jul 17, 2020Updated 5 years ago
- ☆12Aug 6, 2018Updated 7 years ago
- Roboadvisors claim they are democratizing the access to advanced advisory services of wealth management. Well, we think that if it is not…☆11Jun 10, 2021Updated 4 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- 🤖 Implementation of Self Normalizing Networks (SNN) in PyTorch.☆12Jun 19, 2017Updated 8 years ago
- Jito enabled Raydium Degen Memecoin Sniper for Solana☆11May 11, 2024Updated last year
- Analyzing Stock Movements using Markov Chains and Monte Carlo Simulation☆12Dec 25, 2016Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- An offline evaluation framework for sequence-based recommender systems☆13May 17, 2019Updated 6 years ago
- ☆10Oct 20, 2025Updated 4 months ago
- Machine Learning solution for Kaggle.com's "Partly Sunny with a Chance of Hashtags"☆27Dec 6, 2013Updated 12 years ago
- ☆11Aug 5, 2012Updated 13 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- Peer-to-Peer insurance on blockchain☆11Jun 14, 2016Updated 9 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago