pa-legg / insider-threat
Prototype development for Insider Threat Detection and Assessment tools
☆8Updated 9 years ago
Alternatives and similar repositories for insider-threat:
Users that are interested in insider-threat are comparing it to the libraries listed below
- ☆20Updated 8 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 6 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆21Updated 3 years ago
- Insider threat detection via bert☆18Updated 3 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 7 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆63Updated 6 years ago
- ☆21Updated 3 years ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆12Updated 3 weeks ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…