Skip to content
#

cyber-security

Here are 435 public repositories matching this topic...

This project focuses on utilising external adversary nodes with passive listening to accurately detect IDS positions in Underwater Acoustic Networks (UWANs), while mapping network topology and identifying potential blind spots for strategic vulnerability exploitation.

  • Updated Sep 1, 2024
  • Python

Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malware and its extent.It deals with the change in network traffic flow.It is developed in Python in Jupyter notebook.

  • Updated Apr 30, 2020
  • Python

Improve this page

Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."

Learn more