Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
https://github.com/biprodeep/awesome-ml-for-cybersecurity
Last synced: about 5 hours ago
JSON representation
-
[↑](#table-of-contents) Papers
- Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Pleiades – From Throw-away Traffic To Bots – Detecting The Rise Of DGA-based Malware
- Anomalous Payload-Based Network Intrusion Detection
- EXPOSURE – Finding Malicious Domains Using Passive DNS Analysis
- Polonium – Tera-Scale Graph Mining for Malware Detection
- Anomalous Payload-Based Network Intrusion Detection
- CAMP – Content Agnostic Malware Protection
- Notos – Building a Dynamic Reputation System for DNS
- Kopis – Detecting malware domains at the upper dns hierarchy
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Выбор технологий Data Mining для систем обнаружения вторжений в корпоративную сеть (RUS)
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Exploiting machine learning to subvert your spam filter
- Anomalous Payload-Based Network Intrusion Detection
- Dimension Reduction in Network Attacks Detection Systems
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Nazca – Detecting Malware Distribution in Large-Scale Networks
- PAYL – Anomalous Payload-based Network Intrusion Detection
- Anagram – A Content Anomaly Detector Resistant to Mimicry Attacks
- Applications of Machine Learning in Cyber Security
- Data Mining для построения систем обнаружения сетевых атак (RUS)
- Нейросетевой подход к иерархическому представлению компьютерной сети в задачах информационной безопасности (RUS)
- Методы интеллектуального анализа данных и обнаружение вторжений (RUS)
- Rise of the machines: Machine Learning & its cyber security applications
- Machine Learning in Cyber Security: Age of the Centaurs
- Automatically Evading Classifiers A Case Study on PDF Malware Classifiers
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Weaponizing Data Science for Social Engineering — Automated E2E Spear Phishing on Twitter
-
[↑](#table-of-contents) Talks
- Applied Machine Learning for Data Exfil and Other Fun Topics
- Defending Networks With Incomplete Information: A Machine Learning Approach
- Advances in Cloud-Scale Machine Learning for Cyber-Defense
- Applied Machine Learning: Defeating Modern Malicious Documents
- Advances in Cloud-Scale Machine Learning for Cyberdefense
- Machine Learning-Based Techniques For Network Intrusion Detection
- Measuring the IQ of your Threat Intelligence Feeds
- Practical Machine Learning in Infosec
- Secure Because Math: A Deep-Dive on ML-Based Monitoring
- Machine Duping 101: Pwning Deep Learning Systems
- Machine Learning & Data Science
- Beyond the Blacklists: Detecting Malicious URL Through Machine Learning
- Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
- Fraud detection using machine learning & deep learning
- Data-Driven Threat Intelligence: Metrics On Indicator Dissemination And Sharing
- Applying Machine Learning to Network Security Monitoring
- Delta Zero, KingPhish3r – Weaponizing Data Science for Social Engineering
- Defeating Machine Learning What Your Security Vendor Is Not Telling You
- Hunting for Malware with Machine Learning
- Machine Learning for Threat Detection
- The Applications Of Deep Learning On Traffic Identification
- CrowdSource: Crowd Trained Machine Learning Model for Malware Capability Det
- Using Machine Learning to Support Information Security
- Defending Networks with Incomplete Information
- Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity
- Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
- Packet Capture Village – Theodora Titonis – How Machine Learning Finds Malware
- Automated Prevention of Ransomware with Machine Learning and GPOs
- Learning to Detect Malware by Mining the Security Literature
- AI and Security
- AI in InfoSec
-
[↑](#table-of-contents) Tutorials
- Deep Session Learning for Cyber Security
- Using Neural Networks to generate human readable passwords
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- fWaf – Machine learning driven Web Application Firewall
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- ShadowBrokers Leak: A Machine Learning Approach
- Practical Machine Learning in Infosec - Virtualbox Image and Stuff
- Applying Machine Learning to Improve Your Intrusion Detection System
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Click Security Data Hacking Project
- Machine Learning based Password Strength Classification
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- A Machine-Learning Toolkit for Large-scale eCrime Forensics
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Big Data and Data Science for Security and Fraud Detection
- Analyzing BotNets with Suricata & Machine Learning
- Deep Session Learning for Cyber Security
- Using Machine Learning to Detect Malicious URLs
- Using deep learning to break a Captcha system
- An Introduction to Machine Learning for Cybersecurity and Threat Hunting
- Deep Session Learning for Cyber Security
-
[↑](#table-of-contents) Datasets
- NSL-KDD Data Sets
- Samples of Security Related Data
- Stratosphere IPS Data Sets
- Data Capture from National Security Agency
- 2007 TREC Public Spam Corpus
- Malware Training Sets: A machine learning dataset for everyone
- KDD Cup 1999 Data
- Malicious URLs Data Sets
- CRIME Database from DeepEnd Research
- DARPA Intrusion Detection Data Sets
- Aktaion Data Sets
-
[↑](#table-of-contents) Courses
-
[↑](#table-of-contents) Miscellaneous
-
[↑](#table-of-contents) Books
- Data Mining and Machine Learning in Cybersecurity
- Machine Learning and Data Mining for Computer Security
- Network Anomaly Detection: A Machine Learning Perspective
- Machine Learning and Security: Protecting Systems with Data and Algorithms
- Machine Learning and Data Mining for Computer Security
- Introduction To Artificial Intelligence For Security Professionals