eastmountyxz / AI-Security-PaperLinks
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
☆209Updated last year
Alternatives and similar repositories for AI-Security-Paper
Users that are interested in AI-Security-Paper are comparing it to the libraries listed below
Sorting:
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆159Updated last year
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆105Updated 4 years ago
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆82Updated 2 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆113Updated 4 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆100Updated 4 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆67Updated 2 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆21Updated last year
- ☆109Updated 2 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆10Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆100Updated 2 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆156Updated 2 years ago
- Data Mining for Cybersecurity☆77Updated 2 years ago
- ☆26Updated 5 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 9 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆67Updated last year
- 网络安全/无线网络安全 论文阅读笔记归档☆13Updated 3 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆204Updated last month
- ☆12Updated 5 years ago
- 本项目通过大模型联动爬虫,检索Github上所有存有有价值漏洞信息与漏洞POC或规则信息的项目,并自动识别项目的目录结构、Readme信息后进行总结分析并分类,所汇总的项目可以帮助安全行业从业者收集漏洞信息、POC信息、规则等。☆132Updated last year
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆119Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆103Updated 7 months ago
- Flow Interaction Graph based attack traffic detection system.☆161Updated last year
- 记录我的安全学术学习☆129Updated 4 years ago
- ☆24Updated 3 years ago
- ☆82Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆62Updated 6 months ago
- 本科毕业设计,参考LENET-5模型,将恶意软件转化为灰度图,通过卷积神经网络实现了恶意软件检测分类,准确率达98%。☆24Updated 4 years ago
- 机器学习NB算法实现基于文本的WebShell检测工具☆35Updated 3 years ago