cslfiu / IoTCryptojackingLinks
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Alternatives and similar repositories for IoTCryptojacking
Users that are interested in IoTCryptojacking are comparing it to the libraries listed below
Sorting:
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆69Updated 2 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- ☆25Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 3 years ago
- ☆23Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 11 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆22Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- A Federated Learning based Android Malware Classification System☆27Updated last year
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- ☆32Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆16Updated 3 years ago
- A tunneled flooding traffic detection system.☆24Updated 6 months ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆23Updated 4 months ago
- Usenix Security'23☆16Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated 2 years ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆45Updated 2 months ago
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- ☆22Updated 2 weeks ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆52Updated 3 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 10 months ago