Skip to content
@gtkcyber

GTK Cyber

Learn to efficiently hunt threats and identify anomalous network behavior using data science

Popular repositories

  1. Griffon Data Science Virtual Machine

    129 27

  2. Learn how to quickly explore your data with Apache Drill

    Jupyter Notebook 5 2

  3. Jupyter Notebook 4 1

  4. Materials for Workshop about Applied Supervised Machine Learning to Cyber Security

    Jupyter Notebook 2 6

  5. Jupyter Notebook 2

  6. L3Harris Public

    Course Materials for L3Harris

    Jupyter Notebook 2

Repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…