GraphChi's C++ version. Big Data - small machine.
☆17Nov 29, 2020Updated 5 years ago
Alternatives and similar repositories for analyzer
Users that are interested in analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆102Nov 26, 2020Updated 5 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- ☆15Mar 31, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆31Feb 6, 2025Updated last year
- ☆11May 3, 2019Updated 6 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆229Apr 29, 2020Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- ☆86Feb 24, 2025Updated last year
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆42Apr 23, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆106Aug 23, 2023Updated 2 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- ☆32Jul 21, 2025Updated 8 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- ☆18Jun 30, 2022Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- Process-Aware Stealthy Attack Detection☆15Oct 17, 2018Updated 7 years ago
- The STINGER in-memory graph store and dynamic graph analysis platform. Millions to billions of vertices and edges at thousands to millio…☆12Nov 10, 2015Updated 10 years ago
- ☆27Dec 10, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Jul 2, 2020Updated 5 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- Anomaly detection in time evolving graphs☆13Aug 18, 2016Updated 9 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Framework that sits on top of Splunk Enterprise Security to do auto-mitigation☆14Dec 29, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆17Updated this week
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 10 months ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- 通过char_RNN、VAE、GAN进行文本生成☆20Nov 22, 2018Updated 7 years ago
- ☆86Mar 29, 2023Updated 2 years ago