| safe-graph/graph-adversarial-learning-literature |
772 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
|
| A curated list of adversarial attacks and defenses papers on graph-structured data. |
| MISP/misp-taxonomies |
238 |
|
0 |
0 |
over 2 years ago |
0 |
|
31 |
other |
Python |
| Taxonomies used in MISP taxonomy system and can be used by other information sharing tool. |
| ocatak/malware_api_class |
72 |
|
0 |
0 |
over 4 years ago |
0 |
|
2 |
mit |
Python |
| Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers |
| mylamour/machine-learning-for-security |
52 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
|
|
| machine learning for security |
| talshapira/FlowPic |
15 |
|
0 |
0 |
almost 4 years ago |
0 |
|
1 |
mit |
Jupyter Notebook |
| T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in IEEE Transactions on Network and Service Management, doi: 10.1109/TNSM.2021.3071441. |
| DevanshuSave/deCAPTCHA |
9 |
|
0 |
0 |
about 9 years ago |
0 |
|
0 |
|
Matlab |
| CAPTCHA solver | Machine Learning | Neural Networks | Image Processing | Feature Extraction | Optical Character Recognition | MATLAB |
| alexmurray/thunderbird-security-classifier |
5 |
|
0 |
0 |
almost 10 years ago |
0 |
|
0 |
|
JavaScript |
| Add security classification to outgoing emails |
| hayesall/MaliciousPortableExecutableDetection |
5 |
|
0 |
0 |
almost 9 years ago |
0 |
|
0 |
mit |
Python |
| Determining whether a portable executable file (.exe) is malicious or benign with comparative results for multiple ML algorithms: AdaBoost, DT, GNB, GradientBoosting, KNN, RF. |
| talshapira/BGP2Vec |
5 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
mit |
Jupyter Notebook |
| We introduce a novel approach for Autonomous System (AS) embedding using deep learning based on only BGP announcements. Using these vectors we are able to solve multiple important classification problems such as AS business types, AS Types of Relationship (ToR) and even IP hijack detection. |