A Natural Language Processing based approach to detect malicious HTTP requests.
☆11Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for seq2seq-anomaly-detection
Users that are interested in seq2seq-anomaly-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 微信公众号毫秒级排版,让你的排版充满审美愉悦感。复制代码到“markdown here基本渲染css”即可。☆35Jan 10, 2024Updated 2 years ago
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆16Jan 30, 2019Updated 7 years ago
- Audio Signal Processing by WebAssembly (WAT: WebAssembly Text format and C++ with Emscripten)☆22Mar 11, 2026Updated 2 weeks ago
- Classify web visitor queries so you can chart, and respond to, trends in information seeking☆14Sep 7, 2023Updated 2 years ago
- dga classification with fasttext☆12Oct 29, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A web demo of rnnoise-wasm to detect the presence of speech in-browser☆15Dec 9, 2020Updated 5 years ago
- Capture and replay execution traces of client-side web applications☆28May 31, 2013Updated 12 years ago
- ☆10Mar 6, 2022Updated 4 years ago
- This project requires to develop a customer segmentation to define marketing strategy. The sample dataset summarizes the usage behavior o…☆12Oct 14, 2019Updated 6 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- Detect webshells.☆11Aug 14, 2020Updated 5 years ago
- Codebase for Efficient yet simple Reinforcement Learning Research Framework☆28Jan 14, 2023Updated 3 years ago
- Site-of-Metabolsim prediction using Graph Neural Networks.☆15Mar 30, 2023Updated 2 years ago
- A python library for the crunchbase api☆19Oct 26, 2011Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Used TensorFlow to build a neural network that can predict fraudulent credit card transactions.☆10Jun 21, 2017Updated 8 years ago
- program course for haidian fellowship☆10Apr 15, 2021Updated 4 years ago
- ☆11Jun 4, 2022Updated 3 years ago
- Distributed Spatial Join Based on Spark☆10May 26, 2022Updated 3 years ago
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators☆24Nov 24, 2017Updated 8 years ago
- 广东某工业大学802.1X客户端 修改自njit8021xclient(Linux版兼容H3C/iNode V3.60-E6307)☆11Jan 24, 2016Updated 10 years ago
- 该资源为网络安全和Web渗透各种类型题目的离线靶场,主要采用PHP语言实现,包括XSS攻击、文件上传漏洞、SQL注入等,基础性资源,希望对安全初学者有所帮助。加油~☆48Aug 9, 2023Updated 2 years ago
- Implementation of bagging-based ensemble for solar irradiance prediction. Base learners used in ensemble learning is stacked-LSTM☆13Aug 28, 2020Updated 5 years ago
- A curated list of awesome Deep Learning tutorials, projects and communities. Deep learning相关学习资料. Forked from other github repositories.☆21Mar 30, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Identifying complex sentences (with more than 2 clauses), detecting clause breakpoints and coverting them to simpler sentences.☆17Dec 2, 2019Updated 6 years ago
- Some PyTorch code for the Kaggle Speech Recognition Challenge☆13Feb 7, 2019Updated 7 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆14Dec 21, 2018Updated 7 years ago
- An attempt to detect fraud in online transaction in deep neural network using pytorch☆13Apr 19, 2018Updated 7 years ago
- ☆11Jan 23, 2017Updated 9 years ago
- A PyTorch implementation of Mixup☆14Jun 2, 2018Updated 7 years ago
- This repository will collect and share awesome ChatGPT related papers and useful tools☆18Apr 2, 2023Updated 2 years ago
- Source code for 'Using and Administering Linux: Volume 2' by David Both☆10Dec 23, 2019Updated 6 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Subsampled Graph-Based DBSCAN☆11Oct 21, 2020Updated 5 years ago
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆32Jan 9, 2025Updated last year
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 10 years ago
- ☆17Nov 24, 2020Updated 5 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Mar 21, 2022Updated 4 years ago
- Exploring internet domain names with deep learning using vector embeddings☆19Dec 14, 2018Updated 7 years ago
- Scraper to get data from crunchbase.com and read - write the data using SQLite database and JSON file.☆16Apr 27, 2019Updated 6 years ago