sort of a back up for MORAN blog for now
-
Updated
Jul 28, 2022 - HTML
sort of a back up for MORAN blog for now
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.
Summary: The Cybersecurity and Infrastructure Security Agency CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. In response to the Russian Invasion of Ukraine, CISA has been closely monitoring the increased malicious cyber activity and has developed strategies to help mitigate the ris…
implement of ML-based anomaly detection models to identify cyberattacks from NetFlow data
Tarefas com o uso de inteligência artificial para detecção de anomalias e ataques adversariais, fazer testes de modelos, hiperparâmetros e produzir relatórios. Tarefas da cadeira de Detecção de Intrusão do curso de Engenharia da Computação (EC) do CIn da UFPE, cadeira cursada por mim de 2023 a 2024.
To use the UNSW-NB15 data set to classify cyber attack. It is an IoT-based dataset that contains network traffic captured by a residential gateway.
This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
The main repository for our DE project! This website will be hosted using GitHub pages. Our plan is to make a website which anyone can visit in case or for prevention of cyber attacks.
Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.
Shade_hunt is an open-source Node.js brute force tool designed to test the security and authentication of systems. With a minimalistic and highly customizable interface, it allows for testing different types of authentication, from simple passwords to API keys and access tokens.
This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"
A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.
This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
This module queries the SentryPeer Phone Number API when making outbound calls from your FreePBX system to help prevent VoIP cyberattacks, fraudulent VoIP phone calls (toll fraud) and improve cybersecurity by detecting early stage reconnaissance attempts.
Best Tools For DoS
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
Add a description, image, and links to the cyberattack topic page so that developers can more easily learn about it.
To associate your repository with the cyberattack topic, visit your repo's landing page and select "manage topics."