Data Mining for Cybersecurity
☆77Jun 21, 2022Updated 3 years ago
Alternatives and similar repositories for Data-Mining-for-Cybersecurity
Users that are interested in Data-Mining-for-Cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 用于应用密码学课程课程实践,编写一个发送端程序和一个接收端程序,接收端要完成对消息的验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。☆17Jun 2, 2019Updated 6 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- 基于JAVA的WEB服务器,实现了GET方法,提供基本的配置管理工具,实现了基本的用户认证、网页防篡改、日志、站点统计每日访问的IP数等功能。☆12Apr 30, 2020Updated 6 years ago
- 四川大学综合教务系统助手,是 一个优化四川大学综合教务系统的「Userscript」,即用户脚本。这不是一个独立的软件,也不是一个浏览器的插件,但可以依赖浏览器的插件运行,或者作为一个Bookmarklet在点击后运行。该脚本可以为综合教务系统增加以下功能:1. 外观美化:会…☆211Jan 11, 2025Updated last year
- 《四川大学计软网学生自救手册》☆84Nov 30, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- JPEG digital watermark based on modified DCT mid-frequency coefficient.☆21Apr 14, 2018Updated 8 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- 基于celery大 规模爬虫☆10Feb 16, 2020Updated 6 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 6 years ago
- ☆13Jul 25, 2022Updated 3 years ago
- Python package for flexible generation of D-optimal experimental designs☆12Jun 6, 2023Updated 2 years ago
- Java学习笔记☆41Jan 19, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 用于提取手机QQ的闪照☆54Feb 17, 2023Updated 3 years ago
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 3 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- course labratory☆14Dec 12, 2018Updated 7 years ago
- dbn with smote 增强☆11Apr 12, 2019Updated 7 years ago
- 灵蛇·代理抓取工具☆16Aug 31, 2021Updated 4 years ago
- OpenFlow Honeypot☆25Jan 5, 2013Updated 13 years ago
- scu-ctf平台上题目的Writeup☆14Oct 30, 2023Updated 2 years ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆55Apr 2, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A large labeled corpus for Application Privacy Policy in Chinese to train named entity recognition models for Android Dangerous PERMSSION…☆11Jun 19, 2025Updated 10 months ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆54Jun 18, 2025Updated 10 months ago
- Used to determine if a twitter account/tweet is a trollbot or not.☆15Mar 2, 2019Updated 7 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Updated this week
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 6 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- A cms system for Sichuan University CTF Association☆10Mar 4, 2020Updated 6 years ago
- 华顺信安技术羊皮卷☆172Jan 20, 2026Updated 3 months ago
- Check VM/SandBox☆17Mar 23, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 5 years ago
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC, parse and diff scan results. It's wonder…☆13Feb 10, 2023Updated 3 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- Reinforcement Learning for Anomaly Detection☆46Feb 25, 2018Updated 8 years ago
- See more at:☆16Jun 3, 2019Updated 6 years ago
- 学习使我快乐!☆14Updated this week