☆16Mar 15, 2019Updated 6 years ago
Alternatives and similar repositories for microsoft-malware-detection
Users that are interested in microsoft-malware-detection are comparing it to the libraries listed below
Sorting:
- Visual Studio Extension and tools to ease development using Event Tracing for Windows (ETW).☆14Oct 6, 2020Updated 5 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- Multi-class malware classification using Deep Learning☆77Oct 3, 2020Updated 5 years ago
- 基于恶意样本的图像化,对恶意代码进行机器学习并进行检测☆11Mar 25, 2018Updated 7 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Meta-Reinforcement Learning with Policy Residual Representation☆11Aug 15, 2019Updated 6 years ago
- ☆12Jul 6, 2023Updated 2 years ago
- Declarative unit testing for Answer Set Programming projects☆12Mar 4, 2018Updated 8 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- A python framework for Optimal Planning Modulo Theories☆12Jan 26, 2024Updated 2 years ago
- Julia package for scenario generation for stochastic programs with tail risk measure☆11Nov 16, 2022Updated 3 years ago
- Hypergraph Case-Based Reasoning☆12Jun 14, 2018Updated 7 years ago
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- A rule-based stream reasoning engine utilizing sliding windows☆10Jun 3, 2022Updated 3 years ago
- RODI Relational-to-Ontology Mapping Quality Benchmark☆11Feb 24, 2026Updated last week
- A Julia Package for the ACT-R Cognitive Architecture☆12Oct 30, 2025Updated 4 months ago
- Generate mutated sequence files from a reference genome.☆11Dec 26, 2022Updated 3 years ago
- A python library for generating macro-economic scenarios☆10Dec 17, 2024Updated last year
- ☆12Apr 27, 2023Updated 2 years ago
- Analysis code for knowledge discovery project☆12Sep 25, 2018Updated 7 years ago
- Inter-process communication, synchronization & scheduling algorithms☆12Jul 31, 2019Updated 6 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Jan 30, 2023Updated 3 years ago
- Incremental RTEC is the incremental extension of RTEC (https://github.com/aartikis/RTEC) for handling more efficiently out-of-order strea…☆13Nov 26, 2021Updated 4 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- ClamAV Antivirus, in a container. Great for Kubelets!☆14Oct 29, 2020Updated 5 years ago
- NL2Flow: A PDDL Interface to Flow Construction☆14Dec 4, 2025Updated 3 months ago
- Library of example SystemC/TLM peripherals for various SoCs based on the SCS library☆14Feb 8, 2026Updated 3 weeks ago
- OpenMZ, a security kernel for RISC-V targeting secure coprocessors and secure embedded systems.☆15Jun 26, 2020Updated 5 years ago
- This repo is created to perform I/O Request Packet (IRP) driven ransomware analysis where the IRP logs were collected during ransomware e…☆11Aug 14, 2020Updated 5 years ago
- Libraries used by multiple RepRapFirmware projects☆10Updated this week
- Distributed constraint satisfaction with recursive message-passing agents☆16Dec 11, 2017Updated 8 years ago
- ☆14Mar 4, 2024Updated 2 years ago
- ☆15Mar 15, 2024Updated last year
- Protected Process Light Library☆18Jun 20, 2020Updated 5 years ago
- Landmark-Based Approaches for Goal Recognition as Planning.☆14Oct 17, 2025Updated 4 months ago
- Code for paper by Bamler & Mandt, "Extreme Classification via Adversarial Softmax Approximation" (ICLR 2020)☆14Apr 8, 2020Updated 5 years ago
- A set of host side go libraries used by our utilities, drivers, and provisioners☆12Feb 23, 2026Updated last week
- Data structures for fuzzy string search☆11Aug 22, 2022Updated 3 years ago