Cybersecurity Data Mining Competition
Please cite the following papers, if you use the code as part of your research
Long Short-Term Memory based Operation Log Anomaly Detection: http://ieeexplore.ieee.org/document/8125846/
Deep Android Malware Detection and Classification: http://ieeexplore.ieee.org/document/8126084/
Deep Encrypted Text Categorization: https://www.researchgate.net/publication/321507042_Deep_encrypted_text_categorization