Secbrain / TridentLinks
☆25Updated 11 months ago
Alternatives and similar repositories for Trident
Users that are interested in Trident are comparing it to the libraries listed below
Sorting:
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆34Updated 6 months ago
- ☆24Updated 7 months ago
- ☆24Updated last year
- ☆18Updated 4 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆28Updated 4 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆56Updated 4 months ago
- Packet Representation Learning for Traffic Classification☆29Updated 5 months ago
- ☆15Updated last year
- source code for USENIX Security paper xNIDS☆41Updated 9 months ago
- ☆54Updated 4 months ago
- ☆46Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆23Updated 2 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆47Updated 2 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆62Updated 6 months ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆96Updated last year
- ☆22Updated 3 years ago
- ☆9Updated 2 years ago
- ☆12Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆85Updated 4 months ago
- ☆55Updated 5 months ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆118Updated 2 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- ☆19Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆68Updated last month
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- ☆12Updated 3 years ago
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆16Updated 5 months ago