☆17Nov 11, 2021Updated 4 years ago
Alternatives and similar repositories for PicoDomain
Users that are interested in PicoDomain are comparing it to the libraries listed below
Sorting:
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆12Jun 19, 2024Updated last year
- ☆136Jun 17, 2020Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- ☆10Aug 27, 2022Updated 3 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- A Python library for processing and filtering TabLib☆13Aug 24, 2024Updated last year
- Code for "LLM Embeddings Improve Test-time Adaptation to Tabular Y|X-Shifts"☆12Oct 17, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆14Apr 21, 2024Updated last year
- 词、句拼音转汉字、拼音分割、拼音补全、pygame输入中文☆15Mar 21, 2020Updated 6 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆12Jul 22, 2023Updated 2 years ago
- ☆14Jul 24, 2024Updated last year
- Official source code for AAAI 2025 paper: CoRA: Collaborative Information Perception by Large Language Model's Weights for Recommendatio…☆17Dec 11, 2024Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- Women Who Code stuff☆12Dec 10, 2019Updated 6 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆28Feb 23, 2026Updated 3 weeks ago
- Exploring internet domain names with deep learning using vector embeddings☆20Dec 14, 2018Updated 7 years ago
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Jan 24, 2025Updated last year
- ☆31Mar 2, 2018Updated 8 years ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Dec 2, 2024Updated last year
- Prototype Pandemic Unemployment Assistance (PUA) claim service☆12Dec 2, 2021Updated 4 years ago
- Code and Data for paper: Knowledge Perceived Multi-modal Pretraining in E-commerce (ACM MM2021)☆28Oct 10, 2022Updated 3 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Nov 6, 2018Updated 7 years ago
- Repo for EmbedLLM: Learning Compact Representations of Large Language Models☆29Sep 25, 2025Updated 5 months ago
- ☆19Feb 28, 2025Updated last year
- Files to Build a Docker Image for Facebook Prophet☆13Feb 7, 2019Updated 7 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago