This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".
☆13Feb 3, 2024Updated 2 years ago
Alternatives and similar repositories for darkvec
Users that are interested in darkvec are comparing it to the libraries listed below
Sorting:
- ☆12Feb 21, 2022Updated 4 years ago
- A PyTorch implementation of Dynamic Bernoulli Embeddings☆13Dec 26, 2022Updated 3 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 5 months ago
- ☆13Feb 27, 2024Updated 2 years ago
- ☆15Jan 11, 2024Updated 2 years ago
- Local Japanese Hotel Website☆24Jun 6, 2023Updated 2 years ago
- ☆11Oct 16, 2025Updated 5 months ago
- Measure latency(delay), jitter, packet loss ratio of all network links, in ONOS☆18Oct 18, 2020Updated 5 years ago
- 🎉LLaMA Demo 7B🎉☆17Mar 23, 2023Updated 2 years ago
- classroom exercises for 'Operating Systems' course☆10Jun 16, 2022Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- ☆12Jun 19, 2024Updated last year
- 自学时写的适合Java安全小白用来学习Java反序列化漏洞的文章和Demo。(随懒狗的学习进度持续更新🐶)。Some articles and demos written during self-study which are suitable for Java Secu…☆12Dec 22, 2021Updated 4 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Java General Evolutionary Algorithm (jgea) is a modular Java framework for experimenting with Evolutionary Computation.☆24Feb 20, 2026Updated last month
- extract ssl certs from pcap file, only for tls-v1.2☆10Nov 3, 2020Updated 5 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- ☆10Aug 27, 2022Updated 3 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- 根据语法规则生成模拟句子☆12Jan 21, 2019Updated 7 years ago
- Discover, setup, and get stats on network interfaces☆11Nov 17, 2023Updated 2 years ago
- this_my_ctf☆18Nov 17, 2021Updated 4 years ago
- 这个仓库包含了 我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- A Python library for processing and filtering TabLib☆13Aug 24, 2024Updated last year
- AWD 文件监控☆29Sep 14, 2023Updated 2 years ago
- Code for "LLM Embeddings Improve Test-time Adaptation to Tabular Y|X-Shifts"☆12Oct 17, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆14Apr 21, 2024Updated last year
- My personal development tree for Suricata.☆14Feb 7, 2026Updated last month
- 词、句拼音转汉字、拼音分割、拼音补全、pygame输入中文☆15Mar 21, 2020Updated 6 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- RL Agent for Atari Game Pong☆11Aug 25, 2019Updated 6 years ago
- Code of Multi-Defendant Legal Judgment Prediction via Hierarchical Reasoning☆13Apr 29, 2024Updated last year
- Datasets for cybersecurity☆16Aug 12, 2025Updated 7 months ago
- 芯机智物联云:在云端远程管理你的设备. 可穿透内网等各种网络环境.☆10Jun 28, 2019Updated 6 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago