Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'
☆19May 12, 2019Updated 6 years ago
Alternatives and similar repositories for graph_alert_correlation
Users that are interested in graph_alert_correlation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fault-tolerant events/alerts correlation engine☆25Apr 9, 2019Updated 6 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Code for paper "Ranking Causal Anomalies via Temporal and Dynamical Analysis on Vanishing Correlations. Wei Cheng, Kai Zhang, Haifeng Che…☆14Dec 26, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- This is a boilerplate which has dependencies for pyspark(3.3.0) mongo(>4.x) connectivity☆10May 3, 2024Updated last year
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆69Apr 19, 2025Updated 11 months ago
- ☆14Aug 27, 2025Updated 7 months ago
- Interpretation of Isolation Forests☆21Jun 17, 2024Updated last year
- A curated list of research and repositories on the novel technique of hardware fuzzing☆20Mar 8, 2026Updated 2 weeks ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- Supplementary material for KDD 2018 workshop "DCSO: Dynamic Combination of Detector Scores for Outlier Ensembles"☆20Jan 26, 2019Updated 7 years ago
- Non-local Modeling for Image Quality Assessment☆13Dec 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- TensorFlow上的一些项目实例☆16Apr 15, 2019Updated 6 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Detect duplicated items。内容排重框架。☆11Apr 30, 2015Updated 10 years ago
- 天池比赛☆10Jul 4, 2021Updated 4 years ago
- Set of utilities for extracting meta information about react components mostly to generate automated documentation☆11Nov 14, 2019Updated 6 years ago
- ☆22Aug 21, 2025Updated 7 months ago
- 南京邮电大学编译原理实验,支持分析包含直接左递归的LL(1)文法!☆16Nov 11, 2024Updated last year
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 2020-natural-language-processing-project☆10Dec 18, 2020Updated 5 years ago
- ☆34Dec 23, 2025Updated 3 months ago
- A simple CLI command that initialises a Kedro project from an existing Python package☆11Aug 23, 2024Updated last year
- Code in python with tensorflow of the method described in the paper Unsupervised Interpretable Pattern Discovery in Time Series Using Aut…☆21Dec 13, 2018Updated 7 years ago
- 编译课设-词法分析+LR1语法分析+语法制导翻译(生成四元式)☆19Dec 7, 2021Updated 4 years ago
- Web前端加密场景下的参数抓包修改、参数模糊测试工具☆20Jul 22, 2024Updated last year
- ☆13Jun 7, 2021Updated 4 years ago
- ☆11Mar 14, 2023Updated 3 years ago
- AutoML 2024: HPOD: Hyperparameter Optimization for Unsupervised Outlier Detection☆13Jul 12, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository contains 4000 vulnerable hardware designs. Currently this is in Jsonl format for directly using it for fine-tuning LLMs. …☆22Mar 25, 2025Updated last year
- Implementation of the blindbid logic within Zero Knowledge Proofs☆20Sep 15, 2021Updated 4 years ago
- JPEG的正向离散余弦变化、量化、Z字形编码、对DC编码、AC编码、熵 编码以及图像重构☆13May 27, 2019Updated 6 years ago
- ☆23Jun 22, 2024Updated last year
- Pre-Silicon Hardware Fuzzing Toolkit☆62Aug 18, 2025Updated 7 months ago
- A Zotero plugin that automatically retrieves and updates paper metadata from multiple academic sources based on paper titles.☆24Mar 17, 2025Updated last year
- ☆21Aug 20, 2025Updated 7 months ago