CISPA Machine Learning in Cybersecurity

Tutorial 1: Getting started:

  • Getting started 1: Working with Jupyter and Python
  • Getting Started 2: How to Load and Visualize Data for Cyber Threat Intelligence Analysis
  • Getting Started 3: Classic Machine Learning for Cybersecurity
  • Getting Started 4: Deep Learning for Cybersecurity

Tutorial 2: Intrusion Detection:

  • Tutorial 2.1: Intrusion Detection System
  • Tutorial 2.2: Deep Learning based IDS
  • Tutorial 2.3: Analyzing Application-Layer Protocols

Tutorial 3: Evading ML-IDS:

  • Tutorial 3.1: Getting started with GANs
  • Tutorial 3.2: Evading ML-based IDS using GANs
  • Tutorial 3: Solutions to Exercises 3.1 & 3.2

Tutorial 4: ML in the hands of Attackers (CTF):

  • Tutorial 4: Automated CTF Solving with LLMs
CISPA Machine Learning in Cybersecurity
  • Search


© Copyright 2025, Christoph R. Landolt, Mario Fritz.

Built with Sphinx using a theme provided by Read the Docs.