| the-akira/Computer-Science-Resources |
2,227 |
|
0 |
0 |
over 2 years ago |
0 |
|
9 |
|
|
| A list of resources in different fields of Computer Science |
| phurwicz/hover |
309 |
|
0 |
0 |
about 2 years ago |
24 |
January 23, 2023 |
4 |
mit |
Python |
| :speedboat: Label data at scale. Fun and precision included. |
| RiccardoBiosas/awesome-MLSecOps |
86 |
|
0 |
0 |
about 2 years ago |
0 |
|
1 |
mit |
|
| A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems. |
| Nth-iteration-labs/contextual |
47 |
|
0 |
0 |
over 5 years ago |
6 |
July 25, 2020 |
2 |
|
R |
| Contextual Bandits in R - simulation and evaluation of Multi-Armed Bandit Policies |
| ultralytics/wave |
15 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
agpl-3.0 |
Python |
| WAveform Vector Exploitation (WAVE): Machine Learning for particle physics detectors. |
| forta-network/labelled-datasets |
12 |
|
0 |
0 |
about 3 years ago |
0 |
|
0 |
mit |
|
| Web3 threat related labelled datasets for data analysis and machine learning developments. |
| wisoffe/exploits-predict |
11 |
|
0 |
0 |
over 2 years ago |
0 |
|
3 |
apache-2.0 |
Jupyter Notebook |
| Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm) |
| jonasrauber/linear-region-attack |
8 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Python |
| A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturbations without doing gradient descent |
| alexfrancow/CVE-Search |
5 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Jupyter Notebook |
| CVE-Search (name still in alpha), is a Machine Learning tool focused on the detection of exploits or proofs of concept in social networks such as Twitter, Github. It is also capable of doing related searches on Google, Yandex, DuckDuckGo on CVEs and detecting if the content may be a functional exploit, a proof of concept or simply information about the vulnerability. |