{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"zero-day-detection","owner":"AbertayMachineLearningGroup","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":8,"forksCount":7,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-30T08:36:50.560Z"}},{"type":"Public","name":"MQTT_ML","owner":"AbertayMachineLearningGroup","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":26,"forksCount":7,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-18T19:10:13.988Z"}},{"type":"Public","name":"siamese-network-for-IDS","owner":"AbertayMachineLearningGroup","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-21T23:54:58.732Z"}},{"type":"Public","name":"flow-aggregation","owner":"AbertayMachineLearningGroup","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-24T15:26:07.397Z"}},{"type":"Public","name":"machine-learning-SIEM-water-infrastructure","owner":"AbertayMachineLearningGroup","isFork":false,"description":" This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.","topicNames":["security","random-forest","machine-learning-algorithms","logistic-regression","academic-project","scada","water","svm-classifier","ethical-hacking","academia"],"topicsNotShown":3,"allTopics":["security","random-forest","machine-learning-algorithms","logistic-regression","academic-project","scada","water","svm-classifier","ethical-hacking","academia","anomaly-detection","scada-security","pumps"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":33,"forksCount":11,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-11T14:10:35.918Z"}},{"type":"Public","name":"network-threats-taxonomy","owner":"AbertayMachineLearningGroup","isFork":false,"description":"Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies","topicNames":["security","research","networking","tool","taxonomy","hacking","security-vulnerability","network-analysis","academia","security-automation"],"topicsNotShown":2,"allTopics":["security","research","networking","tool","taxonomy","hacking","security-vulnerability","network-analysis","academia","security-automation","security-tools","hacking-tools"],"primaryLanguage":{"name":"TeX","color":"#3D6117"},"pullRequestCount":0,"issueCount":0,"starsCount":102,"forksCount":25,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-06-10T11:50:49.248Z"}},{"type":"Public","name":"CryptoKnight","owner":"AbertayMachineLearningGroup","isFork":false,"description":"Cryptographic Dataset Generation & Modelling Framework","topicNames":["linux","machine-learning","cryptography","framework","deep-neural-networks","research","deep-learning","openssl","reverse-engineering","dynamic-analysis"],"topicsNotShown":4,"allTopics":["linux","machine-learning","cryptography","framework","deep-neural-networks","research","deep-learning","openssl","reverse-engineering","dynamic-analysis","elf","malware-analysis","academic-project","threatintel"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":38,"forksCount":12,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-04-08T15:28:21.581Z"}},{"type":"Public","name":"Abertay-Dissertation-Template-LaTeX","owner":"AbertayMachineLearningGroup","isFork":false,"description":"Abertay-Dissertation-Template-LaTeX","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"TeX","color":"#3D6117"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-01T11:12:27.167Z"}}],"repositoryCount":8,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}