Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
Top Corporate LMS for Training | Best Learning Management Software
Deliver and Track Online Training and Stay Compliant - with Axis LMS!
Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
The SBMLevolver is an evolutionary algorithm package that creates SBML models with user-specified properties and behaviour from a given set of building blocks. Applications lie in network reconstruction and synthetic biology.
A genetic algoritm based system for generating profiled endwalls.
This code is based on the Durham Endwall Design System used to produce endwall designs for low speed linear cascades. It consists of a number of Octave scripts which run mesh generators and flow solvers and uses a geneticalgorithm to find the optimal solution.
A java command-line application where the main goal is to solve any simplex problem. It's a team-work school project. It can be usefull for other students who needs to understand the simplex algorithm.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
This project is an implementation of a BML realizer using ROS. The algorithm uses an event-driven architecture, based on Petri nets, to ensure synchronization constraints for robots.
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
DEAL (Domain Extraction ALgorithm) is an application for domain analysis. Its main purpose is to extract domain information from existing Java applications and to create different kinds of models from the extracted data, including domain-specific languages.
Weka++ is a collection of machine learning and data mining algorithm implementations ported from Weka (http://www.cs.waikato.ac.nz/ml/weka/) from Java to C++, with enhancements for usability as embedded components.