Showing 272 open source projects for "detection"

View related business solutions
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 1

    Face Detect (JavaCV)

    Face Detection and Facial Feature Extraction using JavaCV

    A simple Face detection program using JavaCV and OpenCV . Implementing facial feature extraction and face recognition.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    Exact Subgraph Matching Algorithm

    Exact Subgraph Matching Algorithm for Dependency Graphs

    ... association detection and Protein-Protein interaction identification. This Java implementation implements our ESM algorithm. See README file: https://sourceforge.net/projects/esmalgorithm/files/ If you use our ESM implementation to support academic research, please cite the following paper: Haibin Liu, Vlado Keselj, and Christian Blouin. Exploring a Subgraph Matching Approach for Extracting Biological Events from Literature. Computational Intelligence, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    IWIR Tool

    IWIRtool creates, parses and manipulates IWIR workflows

    IWIRtool is Java-based implementation of an IWIR toolset for workflow system developers. IWIRtool is able to parse IWIR XML files and provides a Java Object representation enabling traversal and manipulation of the workflow. Additionally, it provides a simple Java API to enable the construc- tion of IWIR workflows and the serialisation of IWIR Workflows as XML documents compliant to the IWIR XML Schema. The tool is able to parse and evaluate the IWIR condition expressions and will validate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Leader badge
    Downloads: 129 This Week
    Last Update:
    See Project
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 5
    SPARSE: A Symptom-based Antipattern Retrieval Knowledge-based System Using Semantic Web Technologies
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    jSpykee

    Spykee Control Interface in Java

    jSpykee is a Control Software for the Spykee Roboter by Meccano written in Java.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BayesianCortex

    BayesianCortex

    simple algorithm for a realtime interactive visual cortex for painting

    ... be used to create any logical system. In this early version, I'm still working on edge detection and its understanding of the same shapes at different brightnesses. This will be a module of the bigger Human AI Net project and will be used for adding realtime intuitive high dimensional intelligence in audio and visual interactions with the user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Control remote support software for remote workers and IT teams Icon
    Control remote support software for remote workers and IT teams

    Raise the bar for remote support and reduce customer downtime.

    ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
  • 10
    Jidgen is an easy-to-use, but powerful Java-based id generator. It uses templates for automated id generation and optional collision detection to avoid duplicate ids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Equals Checker
    A static checker that model checks the implementation of equality for an Eclipse Java Project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    curjent
    Concurrent agents for Java. Create multithreaded active objects using standard Java interfaces and classes without explicit use of threads, synchronization, or other concurrency primitives.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Shape Grammar Interpreter
    SGI allows to define and interpret most of undeterministic 2D shape grammars. It supports real-time subshape detection and labeled rules. GUI is designed for easy manipulation with shape grammars: creation of shapes, rules and generation of designs.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Android App that detects when the device is moved after inactivity, and gives user some feedback based on events (missed calls, text messages, emails). After first feedback, user can shake the device and receive more detailed notifications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A system to perform analysis of large documents for the purpose of cataloging similar documents. Similarity is based upon contextual analysis of these documents done by identifying common words and proper nouns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    activeinsight
    ActiveInsight provides real-time detection and reaction to events and patterns. It is a platform that enables the detection of meaningful events within multiple, high frequency, event streams.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    This project aims to implement in java the following text mining techniques: Text Language Detection, Keywords and keyphrases extraction, Text Classification, Text Clustering, Single or multiple documents Summarization, Plagiarism Detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Optical Detection of a zone to detect intrusion to it. First version just works an bitmap-file-basis (for algorithm-development)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    creador-open
    A framework for developing multi device and technology capable mobile sites with the Coldfusion language. Initially developed for OpenBD v1.4 (also on v1.5) and tested in Jetty server on a Windows computer. Bundles tested to work in MacOSX and Win.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PAICE is a rapid bioinformatics pathway visualization tool for KEGG-compatible accessions derived from Illumina Solexa next-gen and Affymetrix datasets. It colors KEGG pathways while appreciating detection-calls and duplicate gene copies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The Hironico Db Tool is a graphical database client that can run on all major platforms today. It provides a powerfull, feature rich and user friendly set of tools to work with databases of any vendor using Java drivers while being fast & light.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Sentrick
    Stream-oriented Java library and a set of command line tools for high quality sentence boundary detection. (Sentence segmentation / splitting / disambiguation). Currently has one model for German (trained on general text and Wikipedia lynx dumps).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Can detect digitalizing errors (like silences, saturations and identical samples) in audio files (wav). Scan audio files for statistics like the peak value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SmutDetect
    Development stop on the standalone application, ported as an autopsy module now: http://www.4ensics.co.uk/smutdetect4autopsy/ SmutDetect is a skin-tone image mining software which scans directories for images containing a specified percentage of skin-tones. It ranks (and filters) these images in various reports. Hash-export can be used to process the results in TSK/autopsy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A new Near Duplicate Detection Method
    Downloads: 0 This Week
    Last Update:
    See Project