Alixyvtte / Malicious-URL-Detection-PMANetLinks
Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network
☆13Updated last year
Alternatives and similar repositories for Malicious-URL-Detection-PMANet
Users that are interested in Malicious-URL-Detection-PMANet are comparing it to the libraries listed below
Sorting:
- ☆35Updated 11 months ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆68Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆121Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- ☆26Updated 5 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆14Updated 8 months ago
- Datasets used in the StreamSpot experiments☆61Updated 9 years ago
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆16Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆13Updated 2 years ago
- Training Vision Transformers from Scratch for Malware Classification☆28Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 10 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆26Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- A Knowledge Graph for Open Source Security Tools☆18Updated last year
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆28Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆163Updated last year
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆71Updated last year
- ☆36Updated 10 months ago
- 使用CodeBERT来webshell classfication☆34Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆47Updated last month
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- ☆15Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- ☆24Updated 4 years ago
- ☆28Updated 4 years ago