2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化
☆21Jun 11, 2023Updated 2 years ago
Alternatives and similar repositories for HUSTCSE-Graduation-Project
Users that are interested in HUSTCSE-Graduation-Project are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- 老年人阿尔默兹海默症预防诊断,方法:随机森林+遗传算法【PS:论文(已发表)+专利(已撰写)】,可供参考,支持联系zheng-gogo作者讨论,禁止商业、侵权等操作使用☆11Mar 18, 2021Updated 5 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检 测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆168Oct 26, 2023Updated 2 years ago
- ☆15Dec 7, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- 网络爬虫(又称为网页蜘蛛,网络机器人,在FOAF社区中间,更经常的称为网页追逐者),是一种按照一定的规则,自动地抓取万维网信息的程序或者脚本。另外一些不常使用的名字还有蚂蚁、自动索引、模拟程序或者蠕虫。☆10Aug 2, 2023Updated 2 years ago
- [SIGKDD 2024] Rethinking Fair Graph Neural Networks from Re-balancing☆10Jul 15, 2024Updated last year
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- ☆14Jul 26, 2019Updated 6 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- 利用connect、tcpsyn、tcpfin、udp实现端口扫描,使用socket☆11Jul 17, 2020Updated 5 years ago
- [CIKM 2023] Towards Fair Graph Neural Networks via Graph Counterfactual.☆14Mar 4, 2025Updated last year
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source code for the following paper(arXiv link): Improved Actor Relation Graph based Group Activity Recognition Zijian Kuang, Xinran Tie☆15Jan 19, 2022Updated 4 years ago
- 华中科技大学 网络空间安全学院 2020级 网络空间安全综合实践☆27Jun 8, 2022Updated 3 years ago
- 泛微OA V8 SQL注入☆10Apr 11, 2021Updated 5 years ago
- 人脸识别SDK 采用C++编写,支持两张照片进行比对1:1,以及1:N 人脸搜索☆12Nov 23, 2014Updated 11 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 5 months ago
- 基于长短记忆型递归神经网络的水质预测模型☆11Aug 11, 2018Updated 7 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 2 years ago
- 一个快速扫描dns域传输漏洞的脚本(ZTdns is a quick script to scan for DNS zone transfer vulnerabilities)☆14Apr 7, 2024Updated 2 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 在信息化时代,互联网中存储着海量多模态、多类型的资源。这些资源中包含了大量网络公害数据,例如黄赌毒、电信诈骗、网络敲诈、网络谣言、虚假新闻等。其中,数据的载体包括文本、图像、音频、视频,并且以非结构化或者半结构化形式存在 。构建面向网络公害治理的知识图谱的任务是对这些海量多模…☆12Jul 13, 2022Updated 3 years ago
- ☆13Apr 27, 2018Updated 7 years ago
- Chinese Translation for Bartosz Milewski's 'Category Theory for Programmers'. 《写给程序员的范畴论》中文翻译 欢迎 PR☆12Oct 4, 2024Updated last year
- 手持设备环境的搭建及程序开发,如手持终端设备、PDA手持终端、条码数据采集器等设备☆11Oct 20, 2016Updated 9 years ago
- Real time and high performance web application layer DDos/Dos/Bot attacks detection and protection.☆17Aug 28, 2022Updated 3 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆15Nov 7, 2023Updated 2 years ago
- Ctrl.Admin 为基础权限后台 目前有权限管理 菜单管理 代码生成 日志审计等☆14Dec 8, 2022Updated 3 years ago
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- this is a repo for the demo on backdoor attacks on StyleGAN and WaveGAN☆19Aug 4, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simple landing page built with Tailwind CSS and Next.js☆11May 18, 2022Updated 3 years ago
- A Tool-Chain for Quantitative Evaluation of Uncertainty-Aware Hybrid AADL Designs☆11Apr 28, 2017Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆19Oct 18, 2016Updated 9 years ago
- 基于SDN的ddos攻击检测与防御系统☆12Jun 17, 2023Updated 2 years ago
- 基于机器学习的webshell检测工具☆12Jun 14, 2021Updated 4 years ago
- 抖音数据采集Frida进阶:脱壳、自动化、高频问题☆15Jan 23, 2021Updated 5 years ago
- NUAA操作系统实验课☆10Jun 23, 2023Updated 2 years ago