iLern / MyThesisView external linksLinks
The Overleaf LaTeX template of the bupt graduate thesis.
☆27Mar 7, 2025Updated 11 months ago
Alternatives and similar repositories for MyThesis
Users that are interested in MyThesis are comparing it to the libraries listed below
Sorting:
- 🐯REPLICA of "Auction-based combinatorial multi-armed bandit mechanisms with strategic arms"☆11Dec 17, 2023Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- 💻 🐈 Added a self-attention layer to the CycleGAN implementation (PyTorch).☆13May 31, 2024Updated last year
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- eAudit suite for recording provenance-related system calls on Linux☆17Jan 16, 2026Updated 3 weeks ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- 双城之战风格迁移☆12Jun 14, 2022Updated 3 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 4 years ago
- ☆17Mar 22, 2019Updated 6 years ago
- Generate synthetic data sets containing concept drift, or load one of two real-world concept drift benchmark data sets.☆12May 10, 2013Updated 12 years ago
- 基于Go语言实现的微服务电商系统☆13Mar 17, 2024Updated last year
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- popular concept drift evaluation datasets☆11Jun 8, 2019Updated 6 years ago
- For BambooFox☆14Sep 25, 2016Updated 9 years ago
- ☆18Jun 18, 2023Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆11Jun 18, 2023Updated 2 years ago
- SysFlow edge processing pipeline☆18Jan 15, 2025Updated last year
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆28Sep 10, 2025Updated 5 months ago
- Hide/Block files in filesystem☆14Nov 23, 2021Updated 4 years ago
- This is an Online Test-time Adaptation (OTTA) benckmark conducted on ViT backbones. The paper has been accepted by IJCV.☆19Aug 25, 2025Updated 5 months ago
- The code for our Updates-Leak paper☆17Jul 23, 2020Updated 5 years ago
- Kubescape eBPF agent 🥷🏻☆24Feb 5, 2026Updated last week
- 🔫基于scapy的SSL/TLS特征提取工具及相应随机森林分类器模型☆20Feb 11, 2020Updated 6 years ago
- dataSet for kubAnomaly model☆20Mar 24, 2023Updated 2 years ago
- SandFS helper library☆22Jan 25, 2020Updated 6 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- ☆21Mar 2, 2023Updated 2 years ago
- 基于树莓派OpenCV和PyQT的人脸识别项目☆22Jun 11, 2021Updated 4 years ago
- Incremental Kolmogorov Smirnov☆21Dec 18, 2019Updated 6 years ago
- A categorized list of system calls used by popular Unix-like operating systems☆28Jan 25, 2026Updated 2 weeks ago
- [CVPR 2025] Implementation of "Forensics-Bench: A Comprehensive Forgery Detection Benchmark Suite for Large Vision Language Models"☆31Apr 28, 2025Updated 9 months ago
- ebpf指南开源文档: eBPF基础, eBPF完全入门指南, BPF学习资料, eBPF基本架构及使用, eBPF技术背景, eBPF概念和基本原理, eBPF的实现原理, eBPF解读-基础篇, 为什么你应该关注eBPF, 初识eBPF,eBPF发展现状, 计算机领域最…☆27Jul 23, 2025Updated 6 months ago
- ☆25Dec 14, 2023Updated 2 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- Java Web安全开发规范☆28Oct 10, 2023Updated 2 years ago
- Getting Started with eBPF☆27Nov 4, 2023Updated 2 years ago
- A docker environment for pwn in ctf☆21Jul 12, 2023Updated 2 years ago
- ☆27Dec 10, 2021Updated 4 years ago