Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Awesome-ML-Cybersecurity
Machine Learning For Cybersecurity.
https://github.com/opensci-hub/Awesome-ML-Cybersecurity
Last synced: 4 days ago
JSON representation
-
[↑](#Contents)Scholars Domain
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- arXiv - prints in Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance, Statistics, Electrical Engineering and Systems Science, and Economics. |
- Nature Research
- Springer Link
- EBSCO Host
- IEEE Xplore Digital Library
- Wiley Online Library
- Cogprints - archive papers in any area of Psychology, Neuroscience, and Linguistics, and many areas of Computer Science. |
- ScienceDirect
- Scopus - reviewed literature: Scientific journals...|
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Search Studies
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
- Springer Link
-
[↑](#Contents)License
-
[↑](#Contents)Tutorials
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Using deep learning to break a Captcha system
- Applying Machine Learning to Improve Your Intrusion Detection System
- Analyzing BotNets with Suricata & Machine Learning
- Deep Session Learning for Cyber Security
- Data Mining for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
- Big Data and Data Science for Security and Fraud Detection
- Deep Session Learning for Cyber Security
- Deep Session Learning for Cyber Security
-
[↑](#Contents)References for reseacher
-
[↑](#Contents)Dataset Repositories
- Masquerading User Data
- Malware Training Sets
- NSL-KDD Dataset - KDD dataset |
- Samples of Security Related Data
- DARPA Intrusion Detection Evaluation - line evaluation using network traffic and audit logs collected on a simulation network |
- Stratosphere IPS
- Syber Security Datasets
- Data Capture from National Security Agency
- KDD Cup 1999 Data
- DeepEnd Criminal data set in research
-
[↑](#Contents)Books
- Machine Learning and Data Mining for Computer Security
- Multi-Agent Machine Learning: A Reinforcement Approach
- Reinforcement Learning: State-of-the-Art
- Machine Learning and Data Mining for Computer Security
- Artificial Intelligence In The 21st Century
- Deep Learning
- Data Mining and Machine Learning in Cybersecurity
- Network Anomaly Detection
- Deep Learning For Web Security
- Reinforcement Learning And GAN For Web Security
-
[↑](#Contents)Recommendations
-
[↑](#Contents)Talks
- Using Machine Learning to Support Information Security
- Defending Networks with Incomplete Information
- Build an Antivirus in 5 Min - Fresh Machine Learning
- FeatureSmith: Learning to Detect Malware by Mining the Security Literature
- Measuring the IQ of your Threat Intelligence Feeds
- Fraud detection using machine learning & deep learning
- Applying Machine Learning to Network Security Monitoring
- Metrics On Indicator Dissemination And Sharing
- Applied Machine Learning for Data Exfil and Other Fun Topics
- Secure Because Math: A Deep-Dive on ML-Based Monitoring
- Pwning Deep Learning Systems
- Weaponizing Data Science for Social Engineering
- Crowd Trained Machine Learning Model for Malware Capability Det
- Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
- Packet Capture Village - Theodora Titonis - How Machine Learning Finds Malware
- Machine Learning and Cyber Security
- Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
- Defending Networks With Incomplete Information: A Machine Learning Approach
- Machine Learning & Data Science
- Advances in Cloud-Scale Machine Learning for Cyber-Defense
- Applied Machine Learning: Defeating Modern Malicious Documents
-
[↑](#Contents)Links Domain
-
[↑](#Contents)Deep Learning Papers
- FaceNet: A Unified Embedding for Face Recognition and Clustering
- Deep Residual Learning for Image Recognition
- Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning
- Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks
- Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks
-
[↑](#Contents)Deep Reinforcement Learning Papers
- Deep Recurrent Q-Learning for Partially Observable MDPs
- How to Discount Deep Reinforcement Learning: Towards New Dynamic Strategies - Lavet et al., NIPS Workshop,
- Deep Exploration via Bootstrapped DQN
- Maximum Entropy Deep Inverse Reinforcement Learning
- Value Iteration Networks
- Playing Atari with Deep Reinforcement Learning
- Language Understanding for Text-based Games Using Deep Reinforcement Learning
- Safe and Efficient Off-Policy Reinforcement Learning
- Dynamic Frame skip Deep Q Network
- Control of Memory, Active Perception, and Action in Minecraft
- Deep Reinforcement Learning with Double Q-learning
- Uncertainty-Based Out-of-Distribution Detection in Deep Reinforcement Learning
- Recurrent Reinforcement Learning: A Hybrid Approach
- Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks
- The History Began from AlexNet: A Comprehensive Survey on Deep Learning Approaches
- Unifying Count-Based Exploration and Intrinsic Motivation
- Benchmarking Deep Reinforcement Learning for Continuous Control
Categories
[↑](#Contents)Scholars Domain
51
[↑](#Contents)References for reseacher
45
[↑](#Contents)Tutorials
36
[↑](#Contents)Talks
21
[↑](#Contents)Deep Reinforcement Learning Papers
17
[↑](#Contents)Books
10
[↑](#Contents)Dataset Repositories
10
[↑](#Contents)Links Domain
8
[↑](#Contents)Deep Learning Papers
5
[↑](#Contents)Recommendations
4
[↑](#Contents)License
2
Sub Categories