The Overleaf LaTeX template of the bupt graduate thesis.
☆37Mar 7, 2025Updated last year
Alternatives and similar repositories for MyThesis
Users that are interested in MyThesis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Mar 2, 2023Updated 3 years ago
- ☆12Mar 22, 2025Updated last year
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Image captioning with Transformer☆14Oct 11, 2021Updated 4 years ago
- ☆18Mar 23, 2022Updated 4 years ago
- 《数字媒体(2):多媒体》课程中音频小课堂大作业-人脸美 化任务☆15Jul 14, 2022Updated 3 years ago
- ☆33Aug 31, 2025Updated 6 months ago
- ☆21Mar 2, 2023Updated 3 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago
- For BambooFox☆14Sep 25, 2016Updated 9 years ago
- Implementation of the Hula data plane load balancing protocol☆25Oct 22, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- This is an official PyTorch code for our accepted paper "When All We Need is a Piece of the Pie: A Generic Framework for Optimizing Two-w…☆15Jul 7, 2022Updated 3 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 5 years ago
- trivy-plugin-report 是一个可以将 trivy 的扫描结果转化为 Excel 和 Markdown 格式报告的插件☆19Mar 12, 2025Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Code for CVPR 2024 paper: Positive-Unlabeled Learning by Latent Group-Aware Meta Disambiguation☆21May 19, 2024Updated last year
- ☆38May 7, 2025Updated 10 months ago
- Keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on popular da…☆19Jun 12, 2024Updated last year
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆23Apr 9, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SysFlow edge processing pipeline☆18Jan 15, 2025Updated last year
- SandFS helper library☆22Jan 25, 2020Updated 6 years ago
- SimMatchV2: Semi-Supervised Learning with Graph Consistency☆22Dec 26, 2023Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- Getting Started with eBPF☆27Nov 4, 2023Updated 2 years ago
- 针对kubernetes中的RBAC可能被攻击检测工具。Detection tool for possible attacks on RBAC in kubernetes.☆25Jan 4, 2024Updated 2 years ago
- Download scripts for NAVER Webtoon images☆60Jul 18, 2021Updated 4 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Domain Adaptation benchmark☆27Dec 20, 2024Updated last year
- A Programmer Guide of the P4 Language.☆41Jun 4, 2018Updated 7 years ago
- 模仿百度搜索框☆15Jul 11, 2017Updated 8 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- The code for our Updates-Leak paper☆17Jul 23, 2020Updated 5 years ago
- [CVPR 2025] Implementation of "Forensics-Bench: A Comprehensive Forgery Detection Benchmark Suite for Large Vision Language Models"☆37Apr 28, 2025Updated 10 months ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago