Alixyvtte / Malicious-URL-Detection-PMANetLinks
Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network
☆14Updated last year
Alternatives and similar repositories for Malicious-URL-Detection-PMANet
Users that are interested in Malicious-URL-Detection-PMANet are comparing it to the libraries listed below
Sorting:
- ☆35Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆26Updated last month
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆52Updated last month
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆40Updated 3 years ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆130Updated last year
- 使用CodeBERT来webshell classfication☆36Updated last week
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- Training Vision Transformers from Scratch for Malware Classification☆29Updated 4 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- ☆26Updated 6 years ago
- A Knowledge Graph for Open Source Security Tools☆18Updated 2 years ago
- ☆13Updated last year
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- Trending Research Topics In Cybersecurity☆20Updated 5 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆31Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆15Updated 11 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆165Updated 2 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆63Updated 6 months ago
- ☆25Updated 4 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Updated 4 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Updated 4 years ago
- Malware Classification using Machine learning☆72Updated 10 months ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago