Skip to content
View saidvarlioglu's full-sized avatar

Block or report saidvarlioglu

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. cybersecurity_influential_research_papers cybersecurity_influential_research_papers Public

    Cybersecurity Influential Research Papers Reading List

    1

  2. an_interesting_pattern_of_primes an_interesting_pattern_of_primes Public

    Patterns of Prime Numbers based on Ulman's Spiral

    Jupyter Notebook

  3. text_mining_in_NSF_grants text_mining_in_NSF_grants Public

    How do NSF grants distribute in the states, universities, what kind of words are emerging from past to date.

    Jupyter Notebook

  4. password-cracking-via-python-in-a-sample-penetration-testing password-cracking-via-python-in-a-sample-penetration-testing Public

    password cracking via python in a sample penetration testing

    Jupyter Notebook

  5. Wireshark_Pcap_Analyzer Wireshark_Pcap_Analyzer Public

    Wireshark Pcap Analyzer via Python

    Jupyter Notebook

  6. Text-Mining-Approach-to-Analyze-The-Cyber-Security-Related-Articles Text-Mining-Approach-to-Analyze-The-Cyber-Security-Related-Articles Public

    Forked from msklc/Text-Mining-Approach-to-Analyze-The-Cyber-Security-Related-Articles

    In this study, we analyze the "cyber security" related articles (research papers) which have NFS (National Science Foundation) Awards. After downloading the NFS XML files, we parsing them with xml …

    Jupyter Notebook