TristanBilot / phishGNNLinks
Phishing detection using GNNs (SECRYPT'22)
☆15Updated 6 months ago
Alternatives and similar repositories for phishGNN
Users that are interested in phishGNN are comparing it to the libraries listed below
Sorting:
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆36Updated 3 years ago
- Implementations of 3 phishing detection and identification baselines☆20Updated last year
- Public datasets to help you address various cyber security problems.☆460Updated 3 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆97Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆105Updated last year
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆18Updated 3 months ago
- ☆127Updated 5 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆79Updated 4 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- CICFlowmeter written in python for easy to try out☆76Updated last week
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Updated 6 months ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Updated 4 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated 3 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆32Updated 3 years ago
- Datasets for cybersecurity☆13Updated 4 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 5 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆235Updated 3 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- ☆71Updated 3 months ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆48Updated 2 months ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Updated 2 years ago
- ☆14Updated last year
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆105Updated 3 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- DDoS attack analysis using Machine Learning☆46Updated 5 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆145Updated 4 years ago
- ☆20Updated 3 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆168Updated 6 years ago
- ☆30Updated 7 years ago
- ☆34Updated 2 years ago