ulookme / CyberSecurity-Data-ScienceLinks
Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class imbalance. Unsupervised anomaly detection. End-to-end deep neural networks for malware classification. Create a machine learning Intrusion Detection System (IDS). Employ machine learning for offensive security. L…
☆17Updated 5 years ago
Alternatives and similar repositories for CyberSecurity-Data-Science
Users that are interested in CyberSecurity-Data-Science are comparing it to the libraries listed below
Sorting:
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆195Updated 2 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆343Updated 2 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆165Updated 2 years ago
- ☆58Updated 3 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated last year
- Public datasets to help you address various cyber security problems.☆446Updated 3 years ago
- DDoS attack analysis using Machine Learning☆45Updated 5 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- A machine learning based Intrusion Detection System☆146Updated 5 years ago
- ☆15Updated 8 years ago
- Applied data science in cyber security☆23Updated 3 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆209Updated last year
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆102Updated 2 years ago
- Multi-class malware classification using Deep Learning☆78Updated 4 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆24Updated 4 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆54Updated 3 years ago
- This project contains files for cyber security☆35Updated 6 years ago
- ☆51Updated 9 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆12Updated 5 years ago
- A list of cybersecurity projects that use machine learning techniques☆64Updated 8 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Updated 3 years ago
- Machine Learning applied to Cyber Security Course☆45Updated 6 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆185Updated 2 years ago