All Projects → PacktPublishing → Machine Learning For Cybersecurity Cookbook

PacktPublishing / Machine Learning For Cybersecurity Cookbook

Licence: mit
Machine Learning for Cybersecurity Cookbook, published by Packt

Projects that are alternatives of or similar to Machine Learning For Cybersecurity Cookbook

Tadam
The implementation of https://papers.nips.cc/paper/7352-tadam-task-dependent-adaptive-metric-for-improved-few-shot-learning
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Hyperlearn
50% faster, 50% less RAM Machine Learning. Numba rewritten Sklearn. SVD, NNMF, PCA, LinearReg, RidgeReg, Randomized, Truncated SVD/PCA, CSR Matrices all 50+% faster
Stars: ✭ 1,204 (+1463.64%)
Mutual labels:  jupyter-notebook
Curso aeropython
Curso de iniciación a Python orientado a la ingeniería
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Predictive Models
A repo of the Data Scientist team's open source predictive models.
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Applied Social Network Analysis In Python
Course - 5; Specialization: Applied Data Science with Python; University Of Michigan
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Machinelearningformedicalimages
Example code on how to apply machine learning methods to medical images. Contains code (python and python notebooks) and data (DICOM)
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Nds
On Network Design Spaces for Visual Recognition
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Foxtracker
Facial Head Pose Tracker for Gaming
Stars: ✭ 78 (+1.3%)
Mutual labels:  jupyter-notebook
Download Large File From Google Drive Using Python
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Nosebook
a nose plugin for finding and running IPython notebooks as nose tests
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Reinforcement Learning
Reinforcement learning material, code and exercises for Udacity Nanodegree programs.
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Tensorflow 1x Deep Learning Cookbook
TensorFlow 1.x Deep Learning Cookbook, published by Packt
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Convergent learning
Code for paper "Convergent Learning: Do different neural networks learn the same representations?"
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Machine Learning Without Any Libraries
This is a collection of some of the important machine learning algorithms which are implemented with out using any libraries. Libraries such as numpy and pandas are used to improve computational complexity of algorithms
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Tweeteval
Repository for TweetEval
Stars: ✭ 78 (+1.3%)
Mutual labels:  jupyter-notebook
Coreml Training
Source code for my blog post series "On-device training with Core ML"
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Python High Performance Second Edition
Python High Performance – Second Edition, published by Packt
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook
Covid19italia
Condividiamo informazioni e segnalazioni sul COVID19
Stars: ✭ 78 (+1.3%)
Mutual labels:  jupyter-notebook
Rddc2020
road damage detection challenge 2020
Stars: ✭ 78 (+1.3%)
Mutual labels:  jupyter-notebook
Rhodium
Python Library for Robust Decision Making and Exploratory Modelling
Stars: ✭ 77 (+0%)
Mutual labels:  jupyter-notebook

Machine Learning for Cybersecurity Cookbook

Machine Learning for Cybersecurity Cookbook

This is the code repository for Machine Learning for Cybersecurity Cookbook , published by Packt.

Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

What is this book about?

Organizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference. With this book, you'll learn how to use Python libraries such as TensorFlow and scikit-learn to implement the latest artificial intelligence (AI) techniques and handle challenges faced by cybersecurity researchers.

This book covers the following exciting features: Learn how to build malware classifiers to detect suspicious activities Apply ML to generate custom malware to pentest your security Use ML algorithms with complex datasets to implement cybersecurity concepts Create neural networks to identify fake videos and images Secure your organization from one of the most popular threats – insider threats Defend against zero-day threats by constructing an anomaly detection system Detect web vulnerabilities effectively by combining Metasploit and ML Understand how to train a model without exposing the training data

If you feel this book is for you, get your copy today!

https://www.packtpub.com/

Instructions and Navigations

All of the code is organized into folders. For example, Chapter02.

The code will look like the following:

from sklearn.model_selection import train_test_split
import pandas as pd

Following is what you need for this book: If you’re a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you’ll find this book useful. Familiarity with cybersecurity concepts and knowledge of Python programming is essential to get the most out of this book.

With the following software and hardware list you can run all code files present in the book (Chapter 1-8).

Software and Hardware List

Chapter Software required OS required
1 Python Environment (version depends on recipe) Windows, Mac OS X, and Linux (Any)
2 Cuckoo Sandbox (latest) Windows, Mac OS X, and Linux (Any)
3 UPX Packer 3.95 Windows, Mac OS X, and Linux (Any)
5 Kali Linux 2019.3 Windows, Mac OS X, and Linux (Any)
6 Wireshark 3.0.6 Windows, Mac OS X, and Linux (Any)
7 Octave (latest) Windows, Mac OS X, and Linux (Any)
Appendix VirtualBox (latest) Windows, Mac OS X, and Linux (Any)

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. Click here to download it.

Related products

Get to Know the Author

Emmanuel Tsukerman graduated from Stanford University and obtained his Ph.D. from UC Berkeley. In 2017, Dr. Tsukerman's anti-ransomware product was listed in the Top 10 ransomware products of 2018 by PC Magazine. In 2018, he designed an ML-based, instant-verdict malware detection system for Palo Alto Networks' WildFire service of over 30,000 customers. In 2019, Dr. Tsukerman launched the first cybersecurity data science course.

Suggestions and Feedback

Click here if you have any feedback or suggestions.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].