XFR1998 / CCF-BDCI2022-Web-Attack-Detection-and-ClassificationView external linksLinks
此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu
☆16Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for CCF-BDCI2022-Web-Attack-Detection-and-Classification
Users that are interested in CCF-BDCI2022-Web-Attack-Detection-and-Classification are comparing it to the libraries listed below
Sorting:
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆27Mar 5, 2024Updated last year
- 基于半监督深度学习的木马流量检测方法☆29Jun 11, 2023Updated 2 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- 脱敏的毕业设计——网络安全课程实验仿真系统☆13May 19, 2021Updated 4 years ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated last month
- PoC for CVE-2016-1000027☆12Mar 5, 2021Updated 4 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 5 years ago
- 基于Django的网络安全事件应急响应与处置系统☆13Feb 11, 2025Updated last year
- ☆14May 21, 2024Updated last year
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- 利用大语言模型进行卧底游戏,包括谁是卧底及衍生的发现AI卧底游戏等。☆11Sep 6, 2024Updated last year
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- 适用于目标命令执行不出网、无回显等场景☆13Oct 8, 2022Updated 3 years ago
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- ☆17Jan 6, 2025Updated last year
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13May 12, 2025Updated 9 months ago
- 一个基于区块链的存储系统,可以在多个节点(设备)中,为用户生成非对称加密的公私钥对,并使用此密钥对,对数据进行加密上传,和解密下载。☆14Nov 16, 2022Updated 3 years ago
- Export the articles and reports from Google Scholar easily! (The spider structure is inspired by the Scrapy framework)☆12Nov 10, 2023Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- 内网安全从零开始红队教程,这可能是国内最系统最适合小白的内网安全教程。☆45Sep 25, 2023Updated 2 years ago
- 基于深度学习对dga恶意域名检测研究☆57Dec 8, 2022Updated 3 years ago
- 一款简单的3D打印机☆16Feb 26, 2025Updated 11 months ago
- Write Up Code of HITB Sec-Sin 2021 Make JDBC Attacks Brilliant Again☆14Jun 24, 2023Updated 2 years ago
- “华为杯”第十六届中国研究生数学建模F题 国家一等奖☆13Jul 7, 2020Updated 5 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- ☆17Aug 30, 2024Updated last year
- ☆14Nov 26, 2023Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- PiDAS (Pinpoint Detection and Alarm System) のソースコードです。詳細は https://booth.pm/ja/items/3022619☆13Sep 17, 2022Updated 3 years ago
- ☆14Feb 15, 2023Updated 3 years ago
- 基于格密码和密钥复用的后量子邮件加密系统☆16Jul 25, 2025Updated 6 months ago
- 2019华为杯 第十六届研究生数学建模F题解决方案“基于最小代价与Dubins曲线的改进Dijkstra与A*算法航迹规划“源代码☆15Jan 16, 2020Updated 6 years ago