Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html
☆13Jan 20, 2020Updated 6 years ago
Alternatives and similar repositories for android_malware_classification
Users that are interested in android_malware_classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- ☆16Jul 20, 2018Updated 7 years ago
- An ANN-LSTM based Model for Learning Individual Customer Behavior in Response to Electricity Prices☆11Mar 27, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Classifying products into product categories with the fastText machine learning library. (Python)☆12Sep 5, 2020Updated 5 years ago
- Interesting ATP Proofs☆13Sep 3, 2021Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Power Plant ML Pipeline Application - Apache Spark☆12Dec 12, 2016Updated 9 years ago
- Windfarm Open Data Analysis: “La Haute Borne” (Meuse, France)☆13Nov 12, 2018Updated 7 years ago
- android malware detection☆12Mar 16, 2016Updated 10 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- Android malware detection using static and dynamic analysis☆41Apr 16, 2019Updated 7 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Jul 25, 2024Updated last year
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆25Jun 10, 2023Updated 2 years ago
- ☆17Jan 18, 2021Updated 5 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆25Jul 1, 2022Updated 3 years ago
- Prediction of wind turbine power generation from real-time SCADA data☆16May 22, 2022Updated 3 years ago
- Docker container anomaly detection☆12Sep 30, 2015Updated 10 years ago
- ☆17Nov 16, 2023Updated 2 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 这是一款适用于Ubuntu(基于12.04)系统的操作系统测评软件,名为乐测评, 主要对系统进行如下六个方面的性能检测:CPU、内存、磁盘&IO、网络、开机速度、系统安全,软硬件方面都会进行较全面的检测。每个方面先检测操作系统基本信息,让用户对自己的系统有个基本了解。然后…☆17Mar 25, 2017Updated 9 years ago
- Investigation of Android mobile Malware using the SherLock dataset☆14Jun 29, 2017Updated 8 years ago
- This is a Machine Learning Practice Case of Predictive Maintenance by Python with NASA's Turbofan Engine Degradation Simulation Data Set.☆12Jan 13, 2021Updated 5 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆17Nov 30, 2021Updated 4 years ago
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago
- ☆36Feb 26, 2026Updated 2 months ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆17Apr 26, 2021Updated 5 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆24May 24, 2025Updated 11 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Aug 26, 2018Updated 7 years ago
- Assignments for Stanford CS224n (Winter 2017)☆13Jan 31, 2018Updated 8 years ago
- ☆22Mar 25, 2019Updated 7 years ago
- dataSet for kubAnomaly model☆20Mar 24, 2023Updated 3 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- 新能源汽车爬虫:对汽车之家上电动车销量数据爬取并进行分析。☆15Feb 26, 2023Updated 3 years ago
- ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker☆24Dec 8, 2022Updated 3 years ago