cslfiu / IoTCryptojackingLinks
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Alternatives and similar repositories for IoTCryptojacking
Users that are interested in IoTCryptojacking are comparing it to the libraries listed below
Sorting:
- ☆25Updated 11 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 10 months ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆34Updated 6 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- ☆22Updated last year
- A tunneled flooding traffic detection system.☆23Updated 6 months ago
- source code for USENIX Security paper xNIDS☆42Updated 9 months ago
- This program allow you to extract some features from pcap files.☆38Updated 2 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆68Updated 2 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- ☆19Updated 4 years ago
- ☆32Updated 4 years ago
- ☆11Updated 3 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆51Updated 3 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆26Updated 3 years ago
- Packet Representation Learning for Traffic Classification☆29Updated 5 months ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 3 weeks ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆54Updated 11 months ago
- ☆48Updated 3 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- ☆11Updated 9 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- ☆24Updated 7 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆25Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago