Alixyvtte / Malicious-URL-Detection-PMANetLinks
Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network
☆14Updated 2 years ago
Alternatives and similar repositories for Malicious-URL-Detection-PMANet
Users that are interested in Malicious-URL-Detection-PMANet are comparing it to the libraries listed below
Sorting:
- ☆38Updated last year
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- Training Vision Transformers from Scratch for Malware Classification☆30Updated 4 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Updated last year
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- ☆13Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆54Updated 4 months ago
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- Automatic Malware Signature Generation Tool☆16Updated 4 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆15Updated 10 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 3 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 7 years ago
- Malware Classification using Machine learning☆74Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆35Updated 5 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- Datasets used in the StreamSpot experiments☆64Updated 9 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- A Knowledge Graph for Open Source Security Tools☆18Updated 2 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆57Updated last month
- 使用CodeBERT来webshell classfication☆36Updated 3 months ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆137Updated last year
- ☆27Updated 6 years ago
- ☆34Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- ☆102Updated 5 years ago