Bot Detection by Building Markov Chain Models of Bots Network Behavior
☆16Feb 6, 2021Updated 5 years ago
Alternatives and similar repositories for BOTection
Users that are interested in BOTection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 8 years ago
- The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algori…☆13Oct 19, 2021Updated 4 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- "PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks" ACM ASIACCS 2…☆14Apr 13, 2026Updated last month
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Vehicular component authentication and software isolation☆13Nov 29, 2021Updated 4 years ago
- Evolutionary decision trees☆11Jun 16, 2025Updated 11 months ago
- Userspace USB driver for CAN to USB adapters - based on the Kvaser canlib API☆19Feb 22, 2020Updated 6 years ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- ☆11Aug 28, 2024Updated last year
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- ☆16Sep 20, 2022Updated 3 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Nov 24, 2018Updated 7 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 5 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆58Nov 11, 2019Updated 6 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆24Mar 4, 2023Updated 3 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- ☆15Oct 24, 2023Updated 2 years ago
- ☆14Apr 27, 2020Updated 6 years ago
- ☆17Jun 7, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- Named Entity Recognition implemented by PyTorch including BiLSTM and BiLSCTM+CRF☆13Apr 20, 2020Updated 6 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 8 years ago
- the longene tech-docs for translation, to-be used in wiki: http://www.longene.org/mediawiki/index.php/%E9%A6%96%E9%A1%B5☆13Jan 4, 2011Updated 15 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Linux kernel branches for confidential compute research☆20Apr 6, 2026Updated last month
- Set of modifications for Deno to add subprocess sandboxing☆13May 25, 2023Updated 2 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- ☆11Mar 8, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Security-Oriented Analysis of Application Programs☆13Dec 14, 2018Updated 7 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆18Oct 18, 2023Updated 2 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- JSFlow is a security-enhanced JavaScript interpreter for fine-grained tracking of information flow.☆15May 28, 2021Updated 4 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 4 years ago