TristanBilot / phishGNNLinks
Phishing detection using GNNs
☆13Updated last year
Alternatives and similar repositories for phishGNN
Users that are interested in phishGNN are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆18Updated 6 months ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- ☆19Updated this week
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆80Updated 3 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆51Updated 3 years ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆16Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆68Updated 2 months ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆37Updated 3 months ago
- ☆22Updated 5 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆25Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆181Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆81Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆64Updated last year
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- ☆15Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 10 months ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆34Updated 2 years ago
- ☆22Updated 2 weeks ago
- Feature extraction for CERT insider threat test dataset☆94Updated 8 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- ☆23Updated 3 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 5 years ago
- ☆36Updated 10 months ago
- ☆64Updated last week
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 8 months ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆69Updated 10 months ago
- ☆26Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- Have fun with audit log analysis :)☆152Updated last year