This repository is used to store recording about papers and presentations readed.
☆18Aug 8, 2024Updated last year
Alternatives and similar repositories for Paper_Recording
Users that are interested in Paper_Recording are comparing it to the libraries listed below
Sorting:
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- 学习笔记☆18Oct 19, 2019Updated 6 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Python library to get the Alexa rank of the domain of any URL☆10Jan 28, 2013Updated 13 years ago
- ☆24Aug 24, 2025Updated 6 months ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- ☆61Jun 20, 2022Updated 3 years ago
- Benchmarking code for evaluating the cost of cache coherence protocols implemented on different platforms☆14Apr 13, 2021Updated 4 years ago
- 一个简单的代理浏览器插件☆20Feb 9, 2026Updated last month
- vscode-drawio增强版,提供代码跳转功能☆10Feb 20, 2025Updated last year
- ☆12Aug 8, 2019Updated 6 years ago
- Anderson points-to analysis implementation based on LLVM☆12Jan 3, 2021Updated 5 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- A Windows kernel driver viewer and manager built in Rust — real-time enumeration, signature verification, SCM operations, and multi-for…☆105Updated this week
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- ☆15Nov 29, 2020Updated 5 years ago
- Python搭建代理IP池☆18Oct 16, 2019Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- UEFI OVMF symbol load script for GDB☆22Jul 20, 2022Updated 3 years ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆24Apr 11, 2025Updated 11 months ago
- ☆13Jan 7, 2025Updated last year
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- ☆29Nov 15, 2022Updated 3 years ago
- 对抗训练在NLP中的应用☆14Nov 22, 2021Updated 4 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 10 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year