hbiaodu-git / MixBroker
☆11Updated 10 months ago
Alternatives and similar repositories for MixBroker:
Users that are interested in MixBroker are comparing it to the libraries listed below
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆10Updated 7 months ago
- ☆10Updated 5 months ago
- ☆13Updated 3 years ago
- ☆13Updated 2 years ago
- ☆12Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆14Updated 9 months ago
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆28Updated 2 months ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆25Updated 3 months ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆26Updated 3 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆19Updated last year
- ☆22Updated 3 years ago
- 关于五篇基于区块链的物联网安全相关论文的学习笔记和心得☆27Updated 4 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated 11 months ago
- ☆19Updated 4 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆32Updated 9 months ago
- ☆15Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆33Updated 3 years ago
- Datasets used in the paper "Labeled Transactions-based Dataset of Ethereum Network"☆14Updated 7 months ago
- ☆25Updated 3 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆53Updated 3 months ago
- ☆12Updated 3 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆17Updated 3 years ago
- ☆58Updated 7 years ago
- ☆9Updated 2 years ago
- source code for USENIX Security paper xNIDS☆41Updated 8 months ago
- MSc Project☆35Updated 5 years ago
- Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection (TKDE Accepted)☆114Updated 2 years ago
- ☆11Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- ☆50Updated 3 months ago