Metis: Understanding and Enhancing Regular Expressions in Network
☆14Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Metis
Users that are interested in Metis are comparing it to the libraries listed below
Sorting:
- ☆11Oct 7, 2023Updated 2 years ago
- ☆55Jun 22, 2022Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- ☆30Oct 7, 2025Updated 4 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Orignal code/dev history for Menshen paper (NSDI 2022), see https://github.com/multitenancy-project/menshen for official version.☆31Apr 26, 2022Updated 3 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆141Apr 29, 2024Updated last year
- Wang Wei's End-to-end encrypted traffic classification with one-dimensional convolution neural networks (scripts and article))☆36Sep 21, 2020Updated 5 years ago
- ☆37Jan 14, 2025Updated last year
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- os lectures 2022 spring☆10Aug 25, 2025Updated 6 months ago
- ☆22Aug 29, 2025Updated 6 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches☆12Mar 18, 2024Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- Planter is a modular framework for realising in one-click in-network machine learning algorithms.☆51Feb 10, 2026Updated 2 weeks ago
- Implementation of AppScanner☆46Jul 29, 2022Updated 3 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆101Jun 25, 2022Updated 3 years ago
- Created a Telegram Bot that will send message after every Epoch regarding Training & Validation Accuracy, Loss and Graph too.☆11Sep 6, 2020Updated 5 years ago
- SystemVerilog Example Files☆11Jan 15, 2013Updated 13 years ago
- automated censorship evasion for the client-side and server-side☆11Sep 5, 2021Updated 4 years ago
- GNNs-Pytorch-Geometric-Examples☆10Jun 14, 2020Updated 5 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago
- A configuration controller solution allowing a Zynq device to configure downstream FPGAs☆14Oct 5, 2015Updated 10 years ago
- An interactive ChatGPT-powered command line tool that generates commands using natural language. z-cli 是一个基于 ChatGPT 的交互式命令行工具,支持用户输入自然语言…☆12Apr 11, 2023Updated 2 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- PathVis visualises traceroutes☆11Jan 25, 2024Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- Improved ganomaly2d and for foreign object detection☆12Sep 28, 2019Updated 6 years ago