scusec / Data-Mining-for-CybersecurityLinks
Data Mining for Cybersecurity
☆78Updated 3 years ago
Alternatives and similar repositories for Data-Mining-for-Cybersecurity
Users that are interested in Data-Mining-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆218Updated last year
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆83Updated 3 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆166Updated 2 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Updated 4 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆118Updated 5 years ago
- web安全机器学习入门☆13Updated 7 years ago
- The homework of DNS Security Course☆26Updated 7 years ago
- ☆85Updated 5 years ago
- 基于深度学习对dga恶意域名检测研究☆55Updated 3 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆103Updated 5 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆284Updated last month
- 机器学习检测SQL注入☆63Updated 7 years ago
- The homework of Web Security☆21Updated 7 years ago
- 本项目通过大模型联动爬虫,检索Github上所有存有有价值漏洞信息与漏洞POC或规则信息的项目,并自动识别项目的目录结构、Readme信息后进行总结分析并分类,所汇总的项目可以帮助安全行业从业者收集漏洞信息、POC信息、规则等。☆149Updated 2 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆22Updated 4 years ago
- A cms system for Sichuan University CTF Association☆10Updated 5 years ago
- a demo for detecting anomaly url☆40Updated 8 years ago
- BUPT SCSS大三小学期 机器学习分析恶意加密流量包项目☆65Updated 5 years ago
- 本科毕业设计,参考LENET-5模型,将恶意软件转化为灰度图,通过卷积神经网络实现了恶意软件检测分类,准确率达98%。☆25Updated 5 years ago
- 一个关于人工智能渗透测试分析系列☆208Updated 5 years ago
- 阿里云安全恶意程序检测比赛☆116Updated 5 years ago
- ☆14Updated 6 years ago
- 利用知识图谱分析网络安全事件☆42Updated 5 years ago
- 中文网络安全运营领域开源语料库☆43Updated 5 months ago
- ☆172Updated 7 years ago
- 记录我的安全学术学习☆129Updated 5 years ago
- 基于神经网络的 PHP webshell检测器,目前有Attention与LSTM两种网络结构,以OPCODE作特征基础☆11Updated 6 years ago
- datacon比赛方向三-攻击源与攻击者分析writeup☆93Updated 6 years ago
- ☆41Updated 2 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Updated last month