基于源代码的图融合的智能合约漏洞检测
☆23Apr 23, 2024Updated last year
Alternatives and similar repositories for MVD-HG
Users that are interested in MVD-HG are comparing it to the libraries listed below
Sorting:
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13May 28, 2021Updated 4 years ago
- “CBGRU: A Detection method of Smart Contract Vulnerability Based on Hybrid Model”☆12May 29, 2022Updated 3 years ago
- ☆19Feb 22, 2024Updated 2 years ago
- Code using in Paper "Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge A…☆16Apr 24, 2023Updated 2 years ago
- DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection (IJCNN 2021)☆25May 14, 2023Updated 2 years ago
- MANDO-HGT is a framework for detecting smart contract vulnerabilities. Given either in source code or bytecode forms, MANDO-HGT adapts he…☆20Mar 7, 2024Updated 2 years ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆100Feb 28, 2023Updated 3 years ago
- Dynamit: Dynamic Vulnerability Detection of Ethereum Smart Contracts Using Machine Learning☆30Nov 6, 2023Updated 2 years ago
- A cross-chain framework for fabric based on relay chain tech. The current version of fabric is 1.4.4. 基于fabric的联盟链跨链框架☆13May 5, 2022Updated 3 years ago
- Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection (TSE Accepted)☆24Aug 23, 2022Updated 3 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆33Feb 28, 2023Updated 3 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- ☆29Mar 2, 2026Updated last week
- REST API 单元测试junit用例自动生成工具☆10Mar 18, 2019Updated 6 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- ☆13Apr 27, 2018Updated 7 years ago
- ☆11May 30, 2024Updated last year
- 一个快速扫描dns域传输漏洞的脚本(ZTdns is a quick script to scan for DNS zone transfer vulnerabilities)☆14Apr 7, 2024Updated last year
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆41May 4, 2024Updated last year
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- ☆13Apr 6, 2023Updated 2 years ago
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- RazorBlade - A smart contract vulnerability detection framework utilizing Control Flow Graph (CFG) and Graph Neural Networks (GNN)☆10Apr 11, 2024Updated last year
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- FFMpeg 处理音视频同步的过程分析☆11Dec 30, 2014Updated 11 years ago
- Smart Sync enables the creation of smart contract forks and verifiable synchronization across EVM-compatible blockchain networks.☆13Jan 6, 2023Updated 3 years ago
- 一 键给文件夹中所有的代码添加注释的应用☆14Dec 21, 2023Updated 2 years ago
- Chinese translation of Cosmos IBC spec: https://github.com/cosmos/ibc/tree/main/spec☆11Aug 8, 2022Updated 3 years ago
- 可自定义扩展的渗透测试命令行生成工具☆15Aug 10, 2023Updated 2 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated last year
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- 2011-2019年Top100弱口令密码字典 Top1000密码字典 服务器SSH/VPS密码字典 后台管理密码字典 数据库密码字典 子域名字典☆12Aug 26, 2021Updated 4 years ago
- Fixes multiple issues regarding Wayland compatibility for Minecraft.☆21Feb 21, 2026Updated 2 weeks ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆24Apr 11, 2025Updated 10 months ago