cryptogeekk
Research assistant:Network security and crytopgraphy Lab(IIIT Allahabad) Machine Learning | Blockchain | Cryptanalysis | Network Security | Malware analysis.
Undergrad Computer Science student NIT Kurukshetra
Pinned Repositories
Automated-feature-Extraction-in-Federated-Learning
Blockchain-approach-to-solve-data-poisoning-attack-in-distributed-machine-learning
Research
Data_Poisoning_Attack-Federated-Learning-
Deauthentication-DDOS-attack-using-machine-learning
It contains the detection of Deauthentication DDOS attack performed on server.It uses Machine Learning algorithim to predict whether attack was done on WLAN or not. Normal and attack traffic dataset was created and analyzed using ML.
Detecting-zero-days-attack-with-Federated-Learning
Federated-learning
GCCE-2021-Japan
insights2techinfo
particle-swarm-optimization
Learn about particle swarm optimization (PSO) through Python!
Real-Time-Malicious-URL-detector-using-Machine-Learning
Creating a chrome extension which blocks malicious URL, uses ML as a backend.
cryptogeekk's Repositories
cryptogeekk/Detecting-zero-days-attack-with-Federated-Learning
cryptogeekk/Blockchain-approach-to-solve-data-poisoning-attack-in-distributed-machine-learning
Research
cryptogeekk/Deauthentication-DDOS-attack-using-machine-learning
It contains the detection of Deauthentication DDOS attack performed on server.It uses Machine Learning algorithim to predict whether attack was done on WLAN or not. Normal and attack traffic dataset was created and analyzed using ML.
cryptogeekk/Federated-learning
cryptogeekk/insights2techinfo
cryptogeekk/Real-Time-Malicious-URL-detector-using-Machine-Learning
Creating a chrome extension which blocks malicious URL, uses ML as a backend.
cryptogeekk/Automated-feature-Extraction-in-Federated-Learning
cryptogeekk/Data_Poisoning_Attack-Federated-Learning-
cryptogeekk/GCCE-2021-Japan
cryptogeekk/particle-swarm-optimization
Learn about particle swarm optimization (PSO) through Python!
cryptogeekk/Portfolio
cryptogeekk/starter-academic
cryptogeekk/Adversarial-Machine-Learning
Extension of IEEE ICCE Paper
cryptogeekk/advice
A repository of links with advice related to grad school applications, research, phd etc
cryptogeekk/al-folio
A beautiful, simple, clean, and responsive Jekyll theme for academics
cryptogeekk/ARP-Spoof-detector
cryptogeekk/ARP-Spoofer
This is a python program to perform man in the middle attack.This programs work by changing the mac adress of a attacker to the spoofed mac adress of a server and a client.It also updates the ARP table of a server and a client.
cryptogeekk/attacks-on-federated-learning-systems
cryptogeekk/Basics-C-Programms
cryptogeekk/Cross-Domain-Generalization-of-Intrusions
cryptogeekk/Deep-learning-approach-for-mitigating-phishing-attack-in-a-IOT-devices
cryptogeekk/GLOBECOM-2021
cryptogeekk/hbdvanshika
Happy Birthday Vanshika
cryptogeekk/krishna.github.io
cryptogeekk/lordkrishnaconsultancy.github.io
cryptogeekk/Machine_Learning_Coursera
cryptogeekk/Modelling-with-CICIDS2017
cryptogeekk/Network-Scanning-Tool
This is a tool for displaying the MAC_address and IP address of all the clients connected over a network.
cryptogeekk/Python-SYN-Flood-Attack-Tool
Python SYN Flood Attack Tool, you can start SYN Flood attack with this tool. Simple and efficient.
cryptogeekk/Web_Development