-
### Checklist
- [X] I made sure that there are *no existing issues* - [open](https://github.com/TeamNewPipe/NewPipe/issues) or [closed](https://github.com/TeamNewPipe/NewPipe/issues?q=is%3Aissue+is%3…
-
Basically, I am creating a project named Network Intrusion detection System. Suggest good language for it
-
-
Hello author, I think your idea and implementation effect are very good, so I would like to ask you, may I ask what data set you use? Can you share it?Thank you very much!
-
OpenSearch is used to store and search large volumes of data. OpenSearch audit logs maintain a record of user activity of the system. In conjunction with appropriate tools and procedures, audit logs …
-
**Description**
I am attempting to include additional rule files including the sandbox and incubating rules. I'm doing this in a Helm chart using the following documentation [here](https://falco.or…
-
Thanks for the great work on pathpy! I do research on host intrusion detection with Linux system calls which can be nicely modeled with pathpy. However, a feature I am missing so far is the concept of…
-
Hi Ageron, I have another question although the last is still pending.
when I look at the precision versus recall curve. I can see that if my focus is on precision then a precision of 90% will mean a…
-
The app runs network diagnostics through routing equipment; currently it has a ping sweep.
What I would like:
-Check the availability of web servers hosting critical applications or services.…
-
## The context
We need to be on the same page to discuss the problem and solution of Incident Response (IR) and Threat Detection (TD) connection. Here is some information that will provide you with…