ValerianRey / fed_iot_guardView external linksLinks
Detection of IoT devices infected by malwares from their network communications, using federated machine learning
☆41May 4, 2024Updated last year
Alternatives and similar repositories for fed_iot_guard
Users that are interested in fed_iot_guard are comparing it to the libraries listed below
Sorting:
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- FL-based intrusion detection system development using model averaging.☆42Dec 18, 2022Updated 3 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- Apply Federated Learning and Deep Learning (Deep Auto-encoder) to detect abnormal data for IoT devices.☆36Aug 16, 2022Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- Implementation of a client reputation, gradient checking and homomorphic encryption mechanism to defend a federated learning system from …☆17Jan 11, 2024Updated 2 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- QR-SDN code☆18May 28, 2021Updated 4 years ago
- ☆17Mar 2, 2018Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- ☆21Jan 14, 2023Updated 3 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆52Nov 12, 2025Updated 3 months ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Sep 10, 2024Updated last year
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Code for the case study presented in "Making a Case for Federated Learning in the Internet of Vehicles and Intelligent Transportation Sys…☆27Apr 9, 2021Updated 4 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Federated Reinforcement Learning project☆32Feb 26, 2023Updated 2 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆73Mar 25, 2023Updated 2 years ago
- Adaptive Offloading of Federated Learning on IoT Devices☆75Nov 18, 2022Updated 3 years ago
- ☆11May 1, 2021Updated 4 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Feb 13, 2024Updated 2 years ago