Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright and Credits
Machine Learning for Cybersecurity Cookbook
About Packt
Why subscribe?
Contributors
About the author About the reviewers Packt is searching for authors like you
Preface
Who this book is for What this book covers To get the most out of this book
Download the example code files Download the color images Conventions used
Sections
Getting ready How to do it… How it works… There's more… See also
Get in touch
Reviews
Machine Learning for Cybersecurity
Technical requirements Train-test-splitting your data
Getting ready How to do it... How it works...
Standardizing your data
Getting ready How to do it... How it works...
Summarizing large data using principal component analysis
Getting ready How to do it... How it works...
Generating text using Markov chains
Getting ready How to do it... How it works...
Performing clustering using scikit-learn
Getting ready How to do it... How it works...
Training an XGBoost classifier
Getting ready How to do it... How it works...
Analyzing time series using statsmodels
Getting ready How to do it... How it works...
Anomaly detection with Isolation Forest
Getting ready How to do it... How it works...
Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
Getting ready How to do it… How it works...
Hyperparameter tuning with scikit-optimize
Getting ready How to do it... How it works...
Machine Learning-Based Malware Detection
Technical requirements Malware static analysis
Computing the hash of a sample
Getting ready How to do it... How it works...
YARA
Getting ready How to do it… How it works…
Examining the PE header
Getting ready How to do it... How it works...
Featurizing the PE header
Getting ready How to do it... How it works...
Malware dynamic analysis
Getting ready How to do it... How it works...
Using machine learning to detect the file type
Scraping GitHub for files of a specific type
Getting ready How to do it... How it works...
Classifying files by type
Getting ready How to do it... How it works...
Measuring the similarity between two strings
Getting ready How to do it... How it works...
Measuring the similarity between two files
Getting ready How to do it... How it works...
Extracting N-grams
Getting ready How to do it... How it works...
Selecting the best N-grams
Getting ready How to do it... How it works…
Building a static malware detector
Getting ready How to do it... How it works…
Tackling class imbalance
Getting ready How to do it... How it works…
Handling type I and type II errors
Getting ready How to do it... How it works…
Advanced Malware Detection
Technical requirements Detecting obfuscated JavaScript
Getting ready How to do it... How it works…
Featurizing PDF files
Getting ready How to do it... How it works…
Extracting N-grams quickly using the hash-gram algorithm
Getting ready How to do it... How it works… See also
Building a dynamic malware classifier
Getting ready How to do it... How it works…
MalConv – end-to-end deep learning for malicious PE detection
Getting ready How to do it... How it works…
Tackling packed malware
Using packers
Getting ready How to do it... How it works…
Assembling a packed sample dataset
Getting ready How to do it... How it works…
Building a classifier for packers
Getting ready How to do it... How it works…
MalGAN – creating evasive malware
Getting ready How to do it... How it works…
Tracking malware drift
Getting ready How to do it... How it works…
Machine Learning for Social Engineering
Technical requirements Twitter spear phishing bot
Getting ready How to do it... How it works…
Voice impersonation
Getting ready How to do it... How it works…
Speech recognition for OSINT
Getting ready How to do it... How it works…
Facial recognition
Getting ready How to do it… How it works…
Deepfake
Getting ready How to do it... How it works…
Deepfake recognition
Getting ready How to do it... How it works…
Lie detection using machine learning
Getting ready How to do it... How it works…
Personality analysis
Getting ready How to do it... How it works…
Social Mapper
Getting ready How to do it... How it works…
Fake review generator
Training a fake review generator
Getting ready How to do it... How it works…
Generating fake reviews
Getting ready How to do it... How it works...
Fake news
Getting ready How to do it… How it works…
Penetration Testing Using Machine Learning
Technical requirements CAPTCHA breaker
Processing a CAPTCHA dataset
Getting ready How to do it... How it works…
Training a CAPTCHA solver neural network
Getting ready How to do it... How it works…
Neural network-assisted fuzzing
Getting ready How to do it... How it works…
DeepExploit
Getting ready How to do it... How it works…
Web server vulnerability scanner using machine learning (GyoiThon)
Getting ready How to do it... How it works…
Deanonymizing Tor using machine learning
Getting ready How to do it…
Collecting data Training Predicting
How it works…
IoT device type identification using machine learning
Getting ready How to do it… How it works...
Keystroke dynamics
Getting ready How to do it... How it works...
Malicious URL detector
Getting ready How to do it… How it works…
Deep-pwning
Getting ready How to do it… How it works…
Deep learning-based system for the automatic detection of software vulnerabilities
Getting ready How to do it… How it works…
Automatic Intrusion Detection
Technical requirements Spam filtering using machine learning
Getting ready How to do it... How it works…
Phishing URL detection
Getting ready How to do it… How it works…
Capturing network traffic
Getting ready How to do it… How it works…
Network behavior anomaly detection
Getting ready How to do it… How it works…
Botnet traffic detection
Getting ready How to do it… How it works…
Insider threat detection
Feature engineering for insider threat detection
Getting ready How to do it… How it works...
Employing anomaly detection for insider threats
Getting ready How to do it... How it works…
Detecting DDoS
Getting ready How to do it… How it works…
Credit card fraud detection
Getting ready How to do it… How it works…
Counterfeit bank note detection
Getting ready How to do it... How it works...
Ad blocking using machine learning
Getting ready How to do it... How it works...
Wireless indoor localization
Getting ready How to do it… How it works…
Securing and Attacking Data with Machine Learning
Technical requirements Assessing password security using ML
Getting ready How to do it… How it works…
Deep learning for password cracking
Getting ready How to do it… How it works… There's more
Deep steganography
Getting ready How to do it… How it works…
ML-based steganalysis
Getting ready How to do it... How it works…
ML attacks on PUFs
Getting ready How to do it... How it works… There's more
Encryption using deep learning
Getting ready How to do it... How it works...
HIPAA data breaches – data exploration and visualization
Getting ready How to do it… How it works…
Secure and Private AI
Technical requirements Federated learning
Getting ready How to do it… How it works...
Encrypted computation
Getting ready How to do it… How it works…
Private deep learning prediction
Getting ready How to do it… How it works…
Testing the adversarial robustness of neural networks
Getting ready How to do it... How it works...
Differential privacy using TensorFlow Privacy
Getting ready How to do it... How it works...
Appendix
Setting up a virtual lab environment
Getting ready How to do it... How it works...
Using Python virtual environments
Getting ready How to do it... How it works...
Other Books You May Enjoy
Leave a review - let other readers know what you think
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion