cslfiu / IoTCryptojacking
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Alternatives and similar repositories for IoTCryptojacking:
Users that are interested in IoTCryptojacking are comparing it to the libraries listed below
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆64Updated last year
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆13Updated 2 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆51Updated 8 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆14Updated 3 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 2 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- ☆18Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 4 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆21Updated 6 months ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆24Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆134Updated last year
- ☆21Updated last year
- Malware Classification using Machine learning☆70Updated 3 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆64Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆102Updated last year
- ☆17Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆13Updated 5 years ago
- ☆24Updated 2 weeks ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆16Updated 2 years ago
- CNN based android malware detection system☆22Updated 5 years ago