[ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion
☆18Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for Fusion-Insider-threat-detection
Users that are interested in Fusion-Insider-threat-detection are comparing it to the libraries listed below
Sorting:
- Paper List☆18Jul 2, 2025Updated 8 months ago
- [NAACL 2024] Better Zero-Shot Reasoning with Role-Play Prompting☆36Nov 14, 2023Updated 2 years ago
- [ICASSP 2024] KNN-CTC: Enhancing ASR via Retrieval of CTC Pseudo Labels☆42Mar 20, 2024Updated last year
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- ☆12Apr 18, 2025Updated 10 months ago
- ☆14Feb 19, 2025Updated last year
- ☆21May 19, 2016Updated 9 years ago
- Dataset☆31Jul 31, 2025Updated 7 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- The official implementation of the DIFFA series for dLLM-based large audio language model☆66Mar 3, 2026Updated last week
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 weeks ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 2 months ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- The project for speech translation☆12Sep 28, 2023Updated 2 years ago
- SQL Query generator using Qwen2-1.5B instruct☆12Jun 12, 2025Updated 8 months ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- ☆10Aug 27, 2022Updated 3 years ago
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- TG-CRITIC: A TIMBRE-GUIDED MODEL FOR REFERENCE-INDEPENDENT SINGING EVALUATION☆15May 26, 2023Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago