ulookme / CyberSecurity-Data-ScienceLinks
Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class imbalance. Unsupervised anomaly detection. End-to-end deep neural networks for malware classification. Create a machine learning Intrusion Detection System (IDS). Employ machine learning for offensive security. L…
☆17Updated 5 years ago
Alternatives and similar repositories for CyberSecurity-Data-Science
Users that are interested in CyberSecurity-Data-Science are comparing it to the libraries listed below
Sorting:
- Machine Learning For Cybersecurity.☆69Updated 6 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆198Updated 3 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆182Updated 3 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆363Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆219Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆25Updated last year
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆26Updated 4 years ago
- A machine learning based Intrusion Detection System☆162Updated 6 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆235Updated 3 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆32Updated 3 years ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆105Updated 3 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆106Updated 6 years ago
- DDoS attack analysis using Machine Learning☆47Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆145Updated 4 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 7 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆144Updated 7 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Updated 3 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆75Updated 4 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- Applied data science in cyber security☆23Updated 3 years ago
- A list of cybersecurity projects that use machine learning techniques☆68Updated 9 years ago
- This project contains files for cyber security☆36Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆167Updated 2 months ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Updated 2 years ago
- ☆13Updated 7 months ago