Wayne-on-the-road / ResHybnet
☆10Updated 2 years ago
Alternatives and similar repositories for ResHybnet
Users that are interested in ResHybnet are comparing it to the libraries listed below
Sorting:
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆14Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆94Updated 7 months ago
- ☆48Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆66Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆70Updated 3 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆64Updated last year
- ☆14Updated 6 years ago
- ☆12Updated 3 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆26Updated 3 years ago
- Datasets used in the StreamSpot experiments☆60Updated 9 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆23Updated 3 years ago
- A PyTorch implementation of of E-GraphSAGE.☆88Updated 2 years ago
- ☆18Updated last year
- IoT Attack Detection with machine learning☆27Updated 10 months ago
- Insider threat detection via bert☆19Updated 3 years ago
- ☆52Updated last year
- Public Arena dataset☆12Updated 2 years ago
- NEGSC☆38Updated 11 months ago
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆26Updated 3 years ago
- ☆82Updated last year
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆14Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 10 months ago
- ☆108Updated 2 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated last year
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆24Updated 3 years ago
- ☆23Updated 3 years ago
- ☆20Updated 2 months ago