Some personal work on DARPA TC engagement5
☆20Aug 7, 2023Updated 2 years ago
Alternatives and similar repositories for TC_e5
Users that are interested in TC_e5 are comparing it to the libraries listed below
Sorting:
- ☆123May 3, 2023Updated 2 years ago
- https://marsvillager.github.io/PaperWorkflowAutomation/summary/visualize.html (Safari, Firefox ✓ Edge, Chrome ✗) 论文爬虫+概述: IEEE Symposium …☆13Oct 1, 2025Updated 5 months ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆134Oct 24, 2024Updated last year
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- ☆102Aug 23, 2023Updated 2 years ago
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Nov 22, 2023Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- ☆14Mar 31, 2019Updated 6 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- ☆20Oct 31, 2020Updated 5 years ago
- ☆58Nov 6, 2023Updated 2 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- ☆32Jul 21, 2025Updated 7 months ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- Intuitionistic Fuzzy Broad Learning System: Enhancing Robustness Against Noise and Outliers☆11Oct 26, 2025Updated 4 months ago
- The official implementation of "Unlocking the Potential of Unlabeled Data in Semi-Supervised Domain Generalization" (CVPR 2025)☆14Nov 20, 2025Updated 3 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆92May 15, 2024Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- A Python implementation of improved Label Propagation Algorithm.☆11May 26, 2021Updated 4 years ago
- A Graph Rewriting Tool for Plot Generation, uses Graph Grammars☆11Mar 3, 2014Updated 12 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- [ISSTA'24] A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing☆12Jan 7, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆41Apr 23, 2020Updated 5 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- Code for the paper "Fuzzy c-Means Clustering for Persistence Diagrams"☆14Oct 14, 2023Updated 2 years ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 7 months ago
- ☆16Feb 17, 2025Updated last year
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- A LaTeX template provides a beautiful design of class schedule with colorful course blocks.☆13Feb 10, 2026Updated 3 weeks ago
- A LaTeX template for presentations in the official IEE design.☆17Oct 30, 2025Updated 4 months ago
- Large-scale Data Classification based on the Integrated Fusion of Fuzzy Learning and Graph Neural Network☆13Nov 2, 2023Updated 2 years ago
- ☆13Jul 5, 2021Updated 4 years ago
- [ACM Computing Surveys'23] Implementations or refactor of some temporal link prediction/dynamic link prediction methods and summary of re…☆59Nov 10, 2024Updated last year
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago