Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Secuml | 252 | 2 years ago | gpl-2.0 | Python | ||||||
Machine Learning for Computer Security | ||||||||||
Intrusion Detection System Using Machine Learning | 248 | 6 months ago | mit | Jupyter Notebook | ||||||
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..) | ||||||||||
Pysad | 200 | 1 | 6 months ago | 3 | October 06, 2023 | 1 | bsd-3-clause | Python | ||
Streaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data) | ||||||||||
Network Intrusion Detection | 195 | 5 years ago | 8 | Python | ||||||
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15 | ||||||||||
Intrusion And Anomaly Detection With Machine Learning | 129 | 10 months ago | mit | Python | ||||||
Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities. | ||||||||||
Cyber Security | 89 | 2 years ago | 1 | Jupyter Notebook | ||||||
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities | ||||||||||
Suspicious_login | 73 | 4 months ago | 41 | agpl-3.0 | PHP | |||||
Detect and warn about suspicious IPs logging into Nextcloud | ||||||||||
Gru Svm | 70 | 4 years ago | agpl-3.0 | Python | ||||||
[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection | ||||||||||
Intrusion Detection System Using Cnn And Transfer Learning | 54 | a year ago | mit | Jupyter Notebook | ||||||
Code for intrusion detection system (IDS) development using CNN models and transfer learning | ||||||||||
Awesome Ai For Cybersecurity | 32 | 7 months ago | ||||||||
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud). |