YouAreSpecialToMe / MetisLinks
Metis: Understanding and Enhancing Regular Expressions in Network
☆13Updated 2 years ago
Alternatives and similar repositories for Metis
Users that are interested in Metis are comparing it to the libraries listed below
Sorting:
- A tunneled flooding traffic detection system.☆24Updated 6 months ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆34Updated 4 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆44Updated last year
- Netgpt: Generative pretrained transformer for network traffic☆24Updated 5 months ago
- ☆15Updated 2 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆23Updated 2 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆128Updated last year
- ☆12Updated 3 years ago
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆33Updated 6 years ago
- Code and dataset for AppScanner☆28Updated 7 years ago
- ☆25Updated last year
- 将大容量PCAP按流切分成小PCAP☆23Updated 2 years ago
- 网络流量领域工具库、公开数据集及加密流量解析方法☆73Updated 2 years ago
- ☆17Updated last year
- ☆11Updated 5 years ago
- Packet Representation Learning for Traffic Classification☆29Updated 6 months ago
- 从pcap获取流的基本信息工具☆218Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆16Updated 3 years ago
- Implementation of AppScanner☆42Updated 2 years ago
- ☆10Updated 3 years ago
- ☆56Updated 5 months ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆12Updated last month
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆35Updated 4 years ago
- ☆11Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- ☆24Updated last year
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆106Updated last year