Rise of Legitimate Services for Backdoor Command and Control | Anomali
Threat Hunting at Scale: Tools & Techniques to Mature Your Program
A comprehensive survey on machine learning for networking: evolution
GitHub Archives - Code, Security and Server Stuff
How to Secure GitHub with Automated Threat Detection
How to use Amazon GuardDuty and AWS Web Application Firewall to
Git vs GitHub – Why IT pros should know the difference – 4sysops
GitHub Archives - Code, Security and Server Stuff
Arxiv Sanity Preserver
A National Initiative on AI Skilling and Research
Unsupervised learning for anomaly detection in stock options pricing
An Introduction to Anomaly Detection in R with Exploratory
North Korea Turns Against New Targets?! - Check Point Research
Trocker
Threat Model ATT&CK - NSFOCUS, Inc , a global network and cyber
PDF) Coding Together at Scale: GitHub as a Collaborative Social Network
Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes
Analyzing Microsoft ATA
Test-Driven Data Analysis
iDev: Enhancing Social Coding Security by Cross-platform User
Florian Roth on Twitter: "Wrote a #Sigma rule for #BabyShark malware
securetea · PyPI
GitHub - stamparm/maltrail: Malicious traffic detection system
Which machine learning techniques have you used for fraud detection
New Slack and GitHub Backdoor Malware Evades AntiVirus Detection
Audit logging in Bitbucket Server - Atlassian Documentation
New Phishing Scam uses AES Encryption and Goes After Apple IDs
Implementing a CNN for Human Activity Recognition in Tensorflow
Detecting Malicious Urls with Machine Learning In Python
The Growing Trend of Coin Miner JavaScript Infection
Deep Learning Models for Human Activity Recognition
Video Analysis to Detect Suspicious Activity Based on Deep Learning
Detect Suspicious Code Commits | JupiterOne | Simplified Security
Fraud detection in retail - Linkurious
Memory Leak Patterns in Android - AndroidPub
Kubernetes security for Google Cloud Security Command Center | Sysdig
Anyone else getting these spam emails from github? : github
AI in Finance: Moving forward!
Human Activity Recognition Github Python
How to Use DNS Analytics to Find the Compromised Domain in a Billion
PowerShell Injection with Fileless Payload Persistence and Bypass
Five video classification methods implemented in Keras and TensorFlow
TLS beaconing detection using ee-outliers and Elasticsearch – NVISO Labs
Understanding the Next Generation of Security Technologies | Mythics
Detect Suspicious Code Commits in Pull Requests — JupiterOne
An Introduction to Anomaly Detection in R with Exploratory
New Slack and GitHub Backdoor Malware Evades AntiVirus Detection
An Investigation into Real-time Fraud Detection in the
Android Developers Blog: Google Play game services ends year with a
Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes
Practical Machine Learning for Cloud Intrusion Detection
GitHub Hosts Infostealers Part 2: Cryptominers and Credit Card Stealers
SALVAGE D2 2 Description of the developed algorithms for intrusion
OWASP Top 10 Vulnerabilities & ASP NET
Kubernetes security for Google Cloud Security Command Center | Sysdig
arXiv:1901 03407v2 [cs LG] 23 Jan 2019
GreyWizard - How to create a web application firewall using machine
Nextron Systems on Twitter: "We got a silent alert from our VTI YARA
Security crawl walk run presentation mckay v1 2017
Curating GitHub for engineered software projects | Nuthan Munaiah
My open source Instagram bot got me 2,500 real followers for $5 in
Malicious code found in npm package event-stream downloaded 8
weihongli / Starred · GitHub
Detecting Compressed RTF - SANS Internet Storm Center
Detecting objects in videos and camera feeds using Keras, OpenCV
Splunk and Tensorflow for Security: Catching the Fraudster with
Detecting Malicious Use of NET – Part 2 | Countercept
arXiv:1901 03407v2 [cs LG] 23 Jan 2019
OWASP AppSensor Project - OWASP
Identifying unusual commits on GitHub - Semantic Scholar
Alerting and Detection Strategy Framework - Palantir Blog - Medium
The Supreme Backdoor Factory - dfir it!
Evaluating Convolutional Neural Network for Effective Mobile Malware
Intelligent Surveillance as an Edge Network Service: from Harr
elastalert tagged Tweets and Download Twitter MP4 Videos | Twitur
A Chinese School is Using Facial Recognition to Analyze Students
Matthias Groncki | Jupyter notebooks – a Swiss Army Knife for Quants
Memory Leak Patterns in Android - AndroidPub
Basic motion detection and tracking with Python and OpenCV
Splunk and Tensorflow for Security: Catching the Fraudster with
A National Initiative on AI Skilling and Research
Datasets of the Week, April 2017: Fraud Detection, Exoplanets
Fraud Detection Using Autoencoders in Keras with a TensorFlow Backend
News from the Lab
Eye in the Sky' is a Machine Learning Project that Detects Violent
NeuroBlast: ActiveState's TensorFlow Powered Game Now Available on
Analyzing Microsoft ATA
Bypassing Memory Scanners with Cobalt Strike and Gargoyle
github com-sbilly-awesome-security_-_2017-04-20_00-01-06 : sbilly
DNIF & Freshdesk Integration | DNIF
Implementing a CNN for Human Activity Recognition in Tensorflow
Reducing Risk of Credential Compromise @Netflix
Unsupervised learning for anomaly detection in stock options pricing
YARA Archives - Nextron Systems
THREAT HUNTING FOR NON-HUNTERS – Mike Art Rebultan
PDF) Curating GitHub for engineered software projects
Best of Machine Learning: Reddit Edition - Heartbeat
A National Initiative on AI Skilling and Research
Unsupervised learning for anomaly detection in stock options pricing
Basic motion detection and tracking with Python and OpenCV