☆147Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for safekit
Users that are interested in safekit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Feature extraction for CERT insider threat test dataset☆109Oct 1, 2024Updated last year
- ☆21May 19, 2016Updated 9 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- ☆17Apr 3, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- ☆25Dec 4, 2020Updated 5 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- LogCluster☆33Dec 4, 2022Updated 3 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- List of tools & datasets for anomaly detection on time-series data.☆3,167Oct 21, 2024Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- contains the code for models in the paper Robust, Deep and Inductive Anomaly Detection☆36May 25, 2017Updated 8 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- Repository of the paper "A Systematic Evaluation of Deep Anomaly Detection Methods for Time Series".☆598Apr 13, 2026Updated last week
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Hybrid Isolation Forest☆24Sep 20, 2018Updated 7 years ago
- A framework to implement Machine Learning methods for time series data.☆18Mar 24, 2023Updated 3 years ago
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- ☆139Jun 17, 2020Updated 5 years ago
- 记录一些有趣的文章☆137Mar 15, 2019Updated 7 years ago
- A collection of anomaly detection methods (iid/point-based, graph and time series) including active learning for anomaly detection/discov…☆874May 22, 2024Updated last year
- A combination of Autoencoder and Robust PCA☆188Jun 28, 2024Updated last year
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- "Self-supervised Log Parsing" submitted for review at ECML-PKDD 2020☆60Jul 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆75Apr 6, 2025Updated last year
- Have fun with audit log analysis :)☆155May 5, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago