CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection
☆16Sep 30, 2023Updated 2 years ago
Alternatives and similar repositories for CREME
Users that are interested in CREME are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- A network discrete event simulator for peer-to-peer network modeling.☆13Sep 1, 2019Updated 6 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Signal SNR, periodicity, despike, and time registration accommodating N time series☆12Jun 21, 2017Updated 8 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Solutions to assignments in course- "Bitcoin and Cryptocurrency Technologies", offered by coursera, Princeton University☆11Jun 28, 2018Updated 7 years ago
- ☆11Feb 5, 2024Updated 2 years ago
- PyTorch implementation of "Variational Autoencoders with Jointly Optimized Latent Dependency Structure" [ICLR 2019]☆13Jul 14, 2019Updated 6 years ago
- A comprehensive and accurate emulation of Bitcoin network implementation☆14Nov 1, 2022Updated 3 years ago
- Source code for the paper 'Complex Hyperbolic Knowledge Graph Embeddings with Fast Fourier Transform'.☆12Nov 9, 2022Updated 3 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- ☆16Jun 21, 2022Updated 3 years ago
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆16Feb 27, 2023Updated 3 years ago
- Official rust implementation of the Kadcast P2P protocol for ultra-efficient message dissemination within Dusk Network☆27Mar 5, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆24Nov 9, 2020Updated 5 years ago
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- Public Network Latency Datasets gathered from two platforms: PlanetLab and Seattle☆18Jan 5, 2018Updated 8 years ago
- Implementation of incremental sequential three-way decisions using active learning☆10May 4, 2019Updated 6 years ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆23Apr 9, 2024Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- QEMU-based Memory Sanitizer for binary software.☆23Nov 19, 2025Updated 4 months ago
- Retrieve the Master Key and Client Random from an ssl.SSLSocket☆14Jun 27, 2020Updated 5 years ago
- ☆20Sep 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆23Jan 25, 2020Updated 6 years ago
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆20Apr 3, 2024Updated last year
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆21Aug 24, 2022Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- Code of ACM MM 2021 paper: Information-Growth Attention Network for Image Super-Resolution☆21Dec 1, 2021Updated 4 years ago
- ☆60Jul 10, 2024Updated last year
- ☆35Jun 2, 2018Updated 7 years ago
- Papers of smart contract security analysis (and tools)☆36Jun 5, 2019Updated 6 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago
- Generate a dendrogram from a dataset☆48Feb 5, 2026Updated last month
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆52Jun 21, 2025Updated 9 months ago