TristanBilot / phishGNNLinks
Phishing detection using GNNs (SECRYPT'22)
☆13Updated 3 weeks ago
Alternatives and similar repositories for phishGNN
Users that are interested in phishGNN are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆18Updated 7 months ago
- ☆14Updated last year
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- ☆22Updated 2 weeks ago
- ☆13Updated 3 years ago
- ☆111Updated 5 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆38Updated 4 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆56Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- ☆19Updated 3 weeks ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆23Updated 8 months ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated last year
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆17Updated 2 years ago
- ☆36Updated 10 months ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Code for our submission to IEEE CNS 2022☆18Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆17Updated 11 months ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆40Updated last year
- ☆12Updated 4 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆11Updated 2 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆104Updated 5 years ago
- A Federated Learning based Android Malware Classification System☆27Updated last year
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- ☆67Updated last week
- ☆30Updated last year
- Deep Learning for Domain Name System☆19Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆69Updated 2 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆25Updated last year