Skip to content

opensci-hub/Awesome-ML-Cybersecurity

Repository files navigation

Awesome-ML-Cybersecurity

Awesome Machine Learning And Cybersecurity Awesome

A curated list of Machine Learning and Cybersecurity from multiple sources to help make your studies easier.
Contributions welcome! Read the contribution guidelines first.

Contents


Recommendations

Dataset Repositories

Repository Description
Samples of Security Related Data samples of various types of Security related
DARPA Intrusion Detection Evaluation Intrusion detection systems were tested in the off-line evaluation using network traffic and audit logs collected on a simulation network
Stratosphere IPS The Stratosphere IPS feeds itself with models created from real malware traffic captures.
Syber Security Datasets Open dataset
Data Capture from National Security Agency The National Security Agency permitted both the recording and release of the following datasets.
The ADFA Intrusion Detection Datasets ADFA IDS Datasets which cover both Linux and Windows
NSL-KDD Dataset NSL-KDD dataset
Detecting Malicious URLs The data set consists of about 2.4 million URLs (examples) and 3.2 million features.
Multi-Source Cyber-Security Events This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory’s corporate, internal computer network.
Malware Training Sets A machine learning dataset for everyone
KDD Cup 1999 Data This database contains a standard set of data to be audited, which includes a wide variety of intrusions simulated in a military network environment.
Web attack payloads A collection of web attack payloads.
WAF Malicious request data set Machine learning driven web application firewall to detect malicious queries with high accuracy.
Malware training data set Free Malware Training Datasets for Machine Learning
DeepEnd Criminal data set in research Criminal dataset in research
Publicly available PCAP files This is a list of public packet capture repositories, which are freely available on the Internet.
Masquerading User Data A data set with seeded masquerading users to compare various intrusion detection methods.

Scholars Domain

Website Description
arXiv Open access to 1,486,985 e-prints in Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance, Statistics, Electrical Engineering and Systems Science, and Economics.
Search Studies ICPSR advances and expands social and behavioral research, acting as a global leader in data stewardship and providing rich data resources and responsive educational opportunities for present and future generations.
Nature Research Is the world’s leading multidisciplinary science journal
Springer Link Providing researchers with access to millions of scientific documents from journals, books, series, protocols and reference works.
National Center for Biotechnology Information A free full-text archive of biomedical and life sciences journal literature at the U.S. National Institutes of Health's National Library of Medicine.
EBSCO Host An intuitive online research platform used by thousands of institutions and millions of users worldwide. With quality databases and search features, EBSCOhost helps researchers of all kinds find the information they need fast.
IEEE Xplore Digital Library Delivering full text access to the world's highest quality technical literature in engineering and technology.
Wiley Online Library Hosting one of the world's most extensive multidisciplinary collections of online resources covering life, health and physical sciences, social science, and the humanities.
Cogprints An electronic archive for self-archive papers in any area of Psychology, Neuroscience, and Linguistics, and many areas of Computer Science.
ScienceDirect An large collection of Physical Sciences and Engineering publications, covering a range of disciplines, from the theoretical to the applied.
UC Irvine Machine Learning Repository Maintain 463 data sets as a service to the machine learning community.
Scopus The largest abstract and citation database of peer-reviewed literature: Scientific journals...

Books

Talks

Tutorials

Open Source Project

Links Domain

References for reseacher

[1] SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks
[2] FaceNet: A Unified Embedding for Face Recognition and Clustering
[3] Distributed Representations of Words and Phrases and their Compositionality
[4] Improving Adversarial Robustness by Encouraging Discriminative Features
[5] AutoEncoder by Forest
[6] Malicious Web Request Detection Using Character-level CNN
[7] Deep Residual Learning for Image Recognition
[8] Sliced Recurrent Neural Networks
[9] Detecting malware domains at the upper dns hierarchy
[10] Detecting the Rise of DGA-Based Malware
[11] Finding Malicious Domains Using Passive DNS Analysis
[12] Tera-Scale Graph Mining for Malware Detection
[13] Detecting Malware Distribution in Large-Scale Networks
[14] Anomalous Payload-based Network Intrusion Detection
[15] A Content Anomaly Detector Resistant to Mimicry Attack
[16] Applications of Machine Learning in Cyber Security
[17] Dimension Reduction in Network Attacks Detection Systems
[18] Modeling Password Guessability Using Neural Networks
[19] On Using Machine Learning for Network Intrusion Detection
[20] Anomalous Payload-Based Network Intrusion Detection
[21] Malicious PDF detection
[22] Adversarial support vector machine learning
[23] Exploiting machine learning to subvert your spam filter
[24] Content-Agnostic Malware Protection
[25] Building a dynamic reputation system for dns
[26] BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding

Deep Learning Papers

Deep Reinforcement Learning Papers

License

CC0
To the extent possible under law, Noa Swartz has waived all copyright and related or neighboring rights to this work.

Releases

No releases published

Packages

No packages published