Ruoyu-Li / UAD-Rule-ExtractionLinks
Rule Extraction from Unsupervised Anomaly Detection in Security
☆19Updated 2 months ago
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- NEGSC☆37Updated last year
- ☆12Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆69Updated 2 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆18Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- ☆15Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆89Updated 2 years ago
- ☆29Updated 4 months ago
- Packet Representation Learning for Traffic Classification☆29Updated 6 months ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆10Updated 2 years ago
- ☆48Updated 3 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆16Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆35Updated 4 years ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆26Updated 6 months ago
- ☆25Updated last year
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆69Updated 3 years ago
- ☆17Updated 11 months ago
- ☆9Updated 2 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆23Updated 2 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆12Updated last month
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- ☆18Updated last year
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆28Updated 3 years ago
- ☆15Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆14Updated 10 months ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year