opensci-hub / Awesome-ML-CybersecurityLinks
Machine Learning For Cybersecurity.
☆66Updated 5 years ago
Alternatives and similar repositories for Awesome-ML-Cybersecurity
Users that are interested in Awesome-ML-Cybersecurity are comparing it to the libraries listed below
Sorting:
- Hands-On Machine Learning for Cybersecurity, published by Packt☆194Updated 2 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆156Updated 2 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆339Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- ☆15Updated 8 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 10 months ago
- A list of cybersecurity projects that use machine learning techniques☆63Updated 8 years ago
- Applied data science in cyber security☆22Updated 3 years ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆153Updated last year
- Public datasets to help you address various cyber security problems.☆431Updated 3 years ago
- Machine Learning applied to Cyber Security Course☆44Updated 5 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆366Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆207Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆104Updated 5 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 5 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Updated 4 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- This project contains files for cyber security☆35Updated 6 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆72Updated 4 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆54Updated 4 months ago
- A machine learning based Intrusion Detection System☆142Updated 5 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆52Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆42Updated 2 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- Malware Data Science Reading Diary / Notes☆128Updated 6 years ago