cslfiu / IoTCryptojacking
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Alternatives and similar repositories for IoTCryptojacking:
Users that are interested in IoTCryptojacking are comparing it to the libraries listed below
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆14Updated 3 years ago
- This project contains files for cyber security☆32Updated 6 years ago
- ☆31Updated 4 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆24Updated 10 months ago
- ☆20Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆63Updated last year
- ☆21Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆75Updated 9 months ago
- KronoDroid Dataset☆28Updated 11 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆41Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆21Updated 5 months ago
- source code for USENIX Security paper xNIDS☆36Updated 4 months ago
- Packet Representation Learning for Traffic Classification☆27Updated last month
- Datasets used in the StreamSpot experiments☆54Updated 8 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆18Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆185Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- ☆43Updated 3 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆13Updated 2 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 3 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 2 years ago
- Malware Classification using Machine learning☆70Updated 2 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆43Updated 3 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago