Skip to content
@gtkcyber

GTK Cyber

Learn to efficiently hunt threats and identify anomalous network behavior using data science

Pinned

  1. centaur centaur Public

    1 2

  2. applied_ds_prep applied_ds_prep Public

    Preparation Materials for Applied Data Science for Cyber Security

    Jupyter Notebook 1 1

Repositories

Showing 10 of 10 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…