eastmountyxz / AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
☆210Updated last year
Alternatives and similar repositories for AI-Security-Paper
Users that are interested in AI-Security-Paper are comparing it to the libraries listed below
Sorting:
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆158Updated last year
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆105Updated 4 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆113Updated 4 years ago
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆81Updated 2 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆100Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆66Updated 2 years ago
- ☆108Updated 2 years ago
- Data Mining for Cybersecurity☆77Updated 2 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆20Updated last year
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆64Updated last year
- BUPT SCSS大三小学期 机器学习分析恶意加密流量包项目☆61Updated 4 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Updated 4 years ago
- Flow Interaction Graph based attack traffic detection system.☆158Updated last year
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆10Updated 3 years ago
- 基于机器学习的恶意加密流 量监测平台☆132Updated 4 years ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆119Updated 11 months ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆155Updated 2 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆196Updated 3 weeks ago
- 记录我的安全学术学习☆129Updated 4 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆100Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆32Updated 8 months ago
- 本项目通过大模型联动爬虫,检索Github上所有存有有价值漏洞信息与漏洞POC或规则信息的项目,并自动识别项目的目录结构、Readme信息后进行总结分析并分类,所汇总的项目可以帮助安全行业从业者收集漏洞信息、POC信息、规则等。☆126Updated last year
- 网络流量领域工具库、公开数据集及加密流量解析方法☆67Updated last year
- ☆23Updated 3 years ago
- 本科毕业设计,参考LENET-5模型,将恶意软件转化为灰度图,通过卷积神经网络实现了恶意软件检测分类,准确率达98%。☆24Updated 4 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆51Updated 6 months ago
- pytorch实现基于web的pcap文件恶意流量检测以及深度学习算法☆81Updated last year
- ☆25Updated 5 years ago
- ☆82Updated last year