[S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
☆18Apr 25, 2025Updated 10 months ago
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below
Sorting:
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- ☆87Feb 24, 2025Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆135Oct 24, 2024Updated last year
- A framework for building provenance-based intrusion detection systems with neural networks☆84Mar 6, 2026Updated 2 weeks ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- ☆12Jun 11, 2021Updated 4 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆54Updated this week
- ☆58Nov 6, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- ☆125May 3, 2023Updated 2 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Shanghai Jiao Tong University 2023-2024, CS3601 Operating System☆20Dec 27, 2023Updated 2 years ago
- Have fun with audit log analysis :)☆155May 5, 2024Updated last year
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- simple tutorial of hackintosh☆12Dec 18, 2020Updated 5 years ago
- ☆136Jun 17, 2020Updated 5 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆175Sep 3, 2022Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- ☆14May 14, 2024Updated last year
- ☆14Mar 2, 2023Updated 3 years ago
- Graph Transformers for Large Graphs☆22Apr 26, 2024Updated last year
- Neural Network for classifying movie reviews as positive/negative using IMDB dataset☆12Feb 2, 2021Updated 5 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- Programming guide for AI2615, Algorithm Design and Analysis☆11Jan 17, 2026Updated 2 months ago
- GPT渗透测试工具☆26Apr 24, 2023Updated 2 years ago
- 读过的一些论文,给自己一个总结和交代吧☆18Mar 12, 2024Updated 2 years ago
- ASR_LLM_TTS前端项目☆15Dec 3, 2024Updated last year
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- 中文报告/作业/幻灯片的LaTeX模板 LaTeX templates for reports/homeworks/slides in Chinese☆18Jun 12, 2025Updated 9 months ago
- ☆15Nov 29, 2020Updated 5 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago