AddrMiner / smapLinks
☆20Updated this week
Alternatives and similar repositories for smap
Users that are interested in smap are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- ☆20Updated last year
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆20Updated 3 years ago
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- Metis: Understanding and Enhancing Regular Expressions in Network☆13Updated 3 years ago
- ☆11Updated 3 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆14Updated 3 months ago
- A tunneled flooding traffic detection system.☆26Updated 9 months ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Updated 4 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆23Updated last year
- 2020 西湖论剑恶意流量检测实现代码☆11Updated 2 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 5 years ago
- ☆16Updated last year
- 6Graph is an efficient IPv6 address generator☆23Updated 3 years ago
- 将大容量PCAP按流切分成小PCAP☆23Updated 2 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆15Updated 3 months ago
- ☆16Updated 2 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆48Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- ☆22Updated last year
- ☆13Updated 3 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- ☆25Updated last week
- ☆10Updated 5 years ago
- 收集了人工智能在网络安全领域的比赛、应用案例和博客。☆22Updated 5 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆13Updated 5 years ago
- ☆26Updated 7 years ago
- ☆28Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago