Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class imbalance. Unsupervised anomaly detection. End-to-end deep neural networks for malware classification. Create a machine learning Intrusion Detection System (IDS). Employ machine learning for offensive security. L…
☆17Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for CyberSecurity-Data-Science
Users that are interested in CyberSecurity-Data-Science are comparing it to the libraries listed below
Sorting:
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Machine Learning For Cybersecurity.☆69Nov 9, 2019Updated 6 years ago
- The resources stored in this repository cover data science topics applied to cybersecurity environments.☆25Jun 26, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆32Dec 3, 2022Updated 3 years ago
- ☆30Feb 5, 2026Updated 3 weeks ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆20Dec 12, 2025Updated 2 months ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- The Deep Learning Architect’s Handbook, published by Packt☆36Feb 5, 2026Updated 3 weeks ago
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated 2 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 3 months ago
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- ☆14Jun 13, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- ☆13Jul 26, 2021Updated 4 years ago
- 📘 This repo is full of sample functions to learn common C programming routines. From string operations to math, file I/O to array manipu…☆10May 1, 2024Updated last year
- Türkçe Sahte Kişi/Kimlik/İsim Oluşturucu☆15Nov 10, 2020Updated 5 years ago
- ☆12May 10, 2023Updated 2 years ago
- Building CricketPrediction model using Machine Learning☆14Oct 17, 2023Updated 2 years ago
- This repository contains the code snippets used in "LLM Prompt Engineering For Developers"☆12Apr 22, 2024Updated last year
- ☆15Aug 20, 2025Updated 6 months ago
- ☆10Jan 21, 2019Updated 7 years ago