TristanBilot / phishGNNLinks
Phishing detection using GNNs (SECRYPT'22)
☆13Updated last month
Alternatives and similar repositories for phishGNN
Users that are interested in phishGNN are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆19Updated 8 months ago
- ☆114Updated 5 years ago
- Public datasets to help you address various cyber security problems.☆436Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆16Updated 2 years ago
- ☆68Updated last month
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆41Updated 3 weeks ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆97Updated 9 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆39Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 4 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆154Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆52Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆511Updated 2 months ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆16Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 2 years ago
- ☆14Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆128Updated this week
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- STIX data representing MITRE ATT&CK☆429Updated 2 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆218Updated last year
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆25Updated 3 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆73Updated last year
- ☆17Updated 2 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 4 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆26Updated last month