eastmountyxz / AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
☆210Updated 11 months ago
Alternatives and similar repositories for AI-Security-Paper:
Users that are interested in AI-Security-Paper are comparing it to the libraries listed below
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆158Updated last year
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆105Updated 4 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆113Updated 4 years ago
- Ai与Web安全相关资料的总结库,包括认为写的比较好的一些博客、项目、数据等☆81Updated 2 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆100Updated 4 years ago
- ☆108Updated last year
- 基于深度学习的恶意软件检测研究;MalConv;☆98Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆66Updated 2 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆19Updated last year
- Data Mining for Cybersecurity☆77Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆32Updated 8 months ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆10Updated 2 years ago
- ☆11Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆154Updated 2 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆185Updated 3 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆64Updated 11 months ago
- 该资源为恶意代码检测相关的论文或文章总结,包括作者撰写的恶意代码与机器学习、深度学习相关博客,希望对您有所帮助~☆14Updated 4 years ago
- BUPT SCSS大三小学期 机器学习分析恶意加密流量包项目☆61Updated 4 years ago
- ☆23Updated 3 years ago
- ☆25Updated 5 years ago
- 记录我的安全学术学习☆128Updated 4 years ago
- The homework of Web Security☆20Updated 6 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- ☆12Updated 5 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆41Updated 5 months ago
- ☆23Updated 4 years ago
- ☆82Updated 4 years ago