There are no reviews yet. Be the first to send feedback to the community and the maintainers!
malware_api_class
Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researcherslstm_malware_detection
6g-channel-estimation-dataset
6G Wireless Communication Security - Deep Learning Based Channel Estimation Dataset6g_security
6G and Security repository for telecommunications and AI research. We will share our implementations and publications in 5G and beyond technology, 6G, Security, Machine learning on 6G, Massive MIMO, THz communication and communication networks.apache-http-logs
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.devsecops-tutorial
DevSecOps best practices with a vulnerable Flask based web applicationtrustworthyai
Trustworthy AI: From Theory to Practice book. Explore the intersection of ethics and technology with 'Trustworthy AI: From Theory to Practice.' This comprehensive guide delves into creating AI models that prioritize privacy, security, and robustness. Featuring practical examples in Python, it covers uncertainty quantification, adversarial MLspectrum_sensing
adversarial-ml-training
TradeRES-BC-Portal
TradeRES EU Project: A pioneering Ethereum-based blockchain framework for facilitating secure and efficient energy trading. This repository houses the smart contracts for the EnergyToken and EnergyExchange platforms, enabling the production, consumption, and trading of renewable energy tokens. Explore the future of decentralized energy markets.ocatak.github.io
book-projects
adversarial-detection
PMU-Anomaly-Detection
Trustworthy Cyber-physical Power Systems using AI: Dueling Algorithms for PMU Anomaly Detection and CybersecurityLove Open Source and this site? Check out how you can help us