This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
☆223Apr 30, 2024Updated 2 years ago
Alternatives and similar repositories for AI-Security-Paper
Users that are interested in AI-Security-Paper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆169Oct 26, 2023Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆177Sep 3, 2022Updated 3 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆32Jan 9, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆142Oct 24, 2024Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆19May 20, 2024Updated last year
- ☆128May 3, 2023Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- CyberAttack Sensing and Information Extraction☆74Dec 26, 2024Updated last year
- ☆87Mar 29, 2023Updated 3 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated 2 years ago
- ☆21Oct 31, 2020Updated 5 years ago
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆237Apr 29, 2020Updated 6 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆84Jun 6, 2023Updated 2 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆193May 6, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆65Aug 26, 2025Updated 8 months ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- 该资源主要总结AI文本挖掘、知识发现、数据挖掘、图书情报和知识图谱相关论文。重点以国内和国外优秀论文为主,希望能帮助到大家,也欢迎大家补充。☆21Oct 9, 2021Updated 4 years ago
- Named entity and triple Dataset to create knowledge graphs for Cybersecurity education☆32Aug 4, 2023Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- 该资源 为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- 塑造未来的安全领域智能革命☆635Jan 26, 2025Updated last year
- ☆15Nov 29, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- ☆112Aug 23, 2023Updated 2 years ago
- ☆85Dec 18, 2020Updated 5 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- ☆101Nov 26, 2020Updated 5 years ago
- 本系列代码主要是作者Python人工智能之Keras的系列博客,涉及回归神经网络、CNN、RNN、LSTM等内容。基础性代码,希望对您有所帮助。☆69Mar 22, 2025Updated last year
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 6 years ago