{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Notebooks-Repo","owner":"SecCEN","isFork":true,"description":"Repository containing notebooks of my posts on Medium","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":973,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-27T21:02:49.004Z"}},{"type":"Public","name":"pygpt4all","owner":"SecCEN","isFork":true,"description":"Official supported Python bindings for llama.cpp + gpt4all","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":162,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-28T03:16:03.847Z"}},{"type":"Public","name":"aws-ai-intelligent-document-processing","owner":"SecCEN","isFork":true,"description":"A set of Jupyter notebooks that describes different phases of an Intelligent Document Processing with AWS AI Services","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":73,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-03T02:29:47.142Z"}},{"type":"Public","name":"data-science-on-aws","owner":"SecCEN","isFork":true,"description":"AI and Machine Learning with Kubeflow, Amazon EKS, and SageMaker","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1073,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-28T20:54:10.432Z"}},{"type":"Public","name":"datascience-for-malware-analysis","owner":"SecCEN","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-14T09:45:05.048Z"}},{"type":"Public","name":"Cybersecurity-Lab-at-CEN","owner":"SecCEN","isFork":true,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-09T09:50:49.227Z"}},{"type":"Public","name":"vinayakumarr.github.io","owner":"SecCEN","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":52,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-01T07:12:44.669Z"}},{"type":"Public","name":"Deep-learning-for-Programmers","owner":"SecCEN","isFork":true,"description":"Learn to code deep learning algorithms","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":17,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-30T18:40:48.717Z"}},{"type":"Public","name":"Signal-Processing-and-Pattern-Classification","owner":"SecCEN","isFork":true,"description":"Signal-Processing-and-Pattern-Classification - Atrial fibrillation & PCG classification","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":26,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-26T08:19:52.514Z"}},{"type":"Public","name":"Network-Intrusion-Detection","owner":"SecCEN","isFork":true,"description":"Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":236,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-28T12:25:00.342Z"}},{"type":"Public","name":"Kalasalingam","owner":"SecCEN","isFork":true,"description":"IEEE \"Invited Talk on Deep Learning\" 03/02/2018","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-01T09:19:42.067Z"}},{"type":"Public","name":"CDMC2016","owner":"SecCEN","isFork":true,"description":"Cybersecurity Data Mining Competition 2016","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-01-24T07:58:51.017Z"}},{"type":"Public","name":"Network-Traffic-Analysis","owner":"SecCEN","isFork":true,"description":"SSH traffic analysis","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":8,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-01-24T07:56:16.155Z"}},{"type":"Public","name":"Android-Malware-Detection","owner":"SecCEN","isFork":true,"description":"Android malware detection using static and dynamic analysis","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":13,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-01-24T07:47:05.641Z"}}],"repositoryCount":14,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"SecCEN repositories"}