opensci-hub / Awesome-ML-CybersecurityLinks
Machine Learning For Cybersecurity.
☆68Updated 6 years ago
Alternatives and similar repositories for Awesome-ML-Cybersecurity
Users that are interested in Awesome-ML-Cybersecurity are comparing it to the libraries listed below
Sorting:
- Hands-On Machine Learning for Cybersecurity, published by Packt☆196Updated 2 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆179Updated 2 years ago
- ☆16Updated 8 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆356Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Updated 5 years ago
- Applied data science in cyber security☆23Updated 3 years ago
- A list of cybersecurity projects that use machine learning techniques☆68Updated 9 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆26Updated last year
- Public datasets to help you address various cyber security problems.☆455Updated 3 years ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆236Updated 2 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆49Updated 8 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆374Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆214Updated last year
- A collection of resources for security data☆41Updated 8 years ago
- Machine Learning for Phishing Website Detection☆57Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- ☆59Updated 3 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆164Updated last month
- Machine Learning applied to Cyber Security Course☆47Updated 6 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- This project contains files for cyber security☆36Updated 6 years ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆104Updated 3 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆55Updated 10 months ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago