Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class imbalance. Unsupervised anomaly detection. End-to-end deep neural networks for malware classification. Create a machine learning Intrusion Detection System (IDS). Employ machine learning for offensive security. L…
☆17Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for CyberSecurity-Data-Science
Users that are interested in CyberSecurity-Data-Science are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- Machine Learning For Cybersecurity.☆74Nov 9, 2019Updated 6 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Fundamentals of Machine Learning with Scikit-Learn☆16Jan 14, 2021Updated 5 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- The resources stored in this repository cover data science topics applied to cybersecurity environments.☆25Jun 26, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- This repository serves as a comprehensive resource for integrating machine learning with security operations, offering innovative cyberse…☆37Feb 12, 2026Updated 3 months ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- A simple github actions script to build a llamafile and uploads to huggingface☆17Jan 11, 2024Updated 2 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Supercharge your Machine Learning skills with Tensorflow 2☆10Dec 15, 2025Updated 5 months ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- Python wrapper to use FlowDroid APK analyzer.☆11Jan 30, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A repository for MLSecOps and DevSecOps research and more!☆21Feb 20, 2026Updated 2 months ago
- Android Malware Detection Using Machine Learning Classifiers ( Using Permissions requested by Apps)☆55May 1, 2023Updated 3 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- ☆11Feb 14, 2025Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- ☆16Mar 2, 2026Updated 2 months ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆13May 27, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The repository contains the python implementation of the Android Malware Detection paper: "Empirical assessment of machine learning-based…☆24Oct 3, 2017Updated 8 years ago
- A tool for deriving statistical features from PCAP data☆13Nov 21, 2019Updated 6 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆18Oct 22, 2024Updated last year
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 6 months ago
- A collection of ReactJS exercises samples based on tutorial videos of Udemy's Modern React with Redux course, created by Stephen Grider☆11Jan 7, 2019Updated 7 years ago