Noktec
Former Assistant Professor in EEE Strathclyde, now leading Lupovis cyber deception
LupovisGlasgow, United Kingdom
Pinned Repositories
Abertay_Beamer_Template
ARP-Spoof-SI
ARP Spoof SI is an application that uses ARP packets for establishing a Man In The Middle attack.
CryptoKnight
Cryptographic Dataset Generation & Modelling Framework
CS312
Website
Knuth-Morris-Pratt
Knuth-Morris-Pratt Algorithm
Strachlyde-EEE-Beamer-Template
Unofficial Strathclyde EEE Beamer Template
UDPacketGenerator
UDP Packet Generator
Noktec's Repositories
Noktec/Abertay_Beamer_Template
Noktec/ARP-Spoof-SI
ARP Spoof SI is an application that uses ARP packets for establishing a Man In The Middle attack.
Noktec/Knuth-Morris-Pratt
Knuth-Morris-Pratt Algorithm
Noktec/Strachlyde-EEE-Beamer-Template
Unofficial Strathclyde EEE Beamer Template
Noktec/UDPacketGenerator
UDP Packet Generator
Noktec/CryptoKnight
Cryptographic Dataset Generation & Modelling Framework
Noktec/CS312
Website
Noktec/HEPFAC_ChatGPT
Implementation of HEPFAC on CPU and GPU from ChatGPT
Noktec/IncludeOS
A minimal, resource efficient unikernel for cloud services
Noktec/IP2INT
Simple Matlab Functions that reads an xlsx and converts IP addresses to INT or DOUBLE
Noktec/knockknock
Who's there?
Noktec/machine-learning-SIEM-water-infrastructure
This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
Noktec/mandelbrot
Basic Mandelbrot set in Python
Noktec/mlAndSecurity
Application of machine learning for security
Noktec/netcat-sensor
simple netcat script to generate sensor data
Noktec/network-threats-taxonomy
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies "A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets” and “A Taxonomy of Malicious Traffic for Intrusion Detection Systems”, classifying threats as well as evaluating current datasets. The result shows that a large portion of current research published train IDS algorithms against outdated datasets and outdated threats. To this end, we provide the source of our threat taxonomy, allowing other researchers to contribute and modify it.
Noktec/OS-X-Security-and-Privacy-Guide
A practical guide to securing OS X
Noktec/patoolkit
PA Toolkit is a collection of traffic analysis plugins focused on security
Noktec/Perfect-hashing-based-PFAC-on-GPUs
The implementation of perfect hashing based parallel failureless Aho-Corasick algorithm on Graphic Processing Units
Noktec/pyenv
Simple Python version management
Noktec/ultimate-beamer-theme-list
A collection of custom Beamer themes