The Overleaf LaTeX template of the bupt graduate thesis.
☆31Mar 7, 2025Updated 11 months ago
Alternatives and similar repositories for MyThesis
Users that are interested in MyThesis are comparing it to the libraries listed below
Sorting:
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- ☆15Jan 30, 2025Updated last year
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 4 years ago
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- 基于Go语言实现的微 服务电商系统☆13Mar 17, 2024Updated last year
- eAudit suite for recording provenance-related system calls on Linux☆18Jan 16, 2026Updated last month
- trivy-plugin-report 是一个可以将 trivy 的扫描结果转化为 Excel 和 Markdown 格式报告的插件☆19Mar 12, 2025Updated 11 months ago
- ☆18Jun 18, 2023Updated 2 years ago
- For BambooFox☆14Sep 25, 2016Updated 9 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 5 months ago
- Hide/Block files in filesystem☆14Nov 23, 2021Updated 4 years ago
- pascal编译器,编译原理课程设计作业☆13Jun 3, 2022Updated 3 years ago
- Kubescape eBPF agent 🥷🏻☆24Feb 27, 2026Updated last week
- The code for our Updates-Leak paper☆17Jul 23, 2020Updated 5 years ago
- Implementation of <Contrastive Open Set Recognition> (AAAI-23)☆21Mar 7, 2023Updated 2 years ago
- 🔫基于scapy的SSL/TLS特征提取工具及相应随机森林分类器模型☆20Feb 11, 2020Updated 6 years ago
- Keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on popular da…☆19Jun 12, 2024Updated last year
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆22Apr 9, 2024Updated last year
- Test-time adaptation via Nearest neighbor information (TAST), submitted to ICLR'23☆24Jul 11, 2023Updated 2 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Open-source AI-augmented Security Operations Center using LLMs + Multi-Agent Orchestration | Foundation-Sec-8B | Wazuh | TheHive | RAG☆60Dec 2, 2025Updated 3 months ago
- BUPTGraduateThesis提供北京邮电大学研究生学位论文LaTeX文档类,其符合北邮研究生院2014年11月发布的《关于研究生学位论文格式的统一要求》,目前已根据2017年标准修正格式、添加英文扉页,已根据2023年标准修正格式、添加答辩小组名单页,已根据2024…☆99Jul 17, 2024Updated last year
- 基于树莓派OpenCV和PyQT的人脸识别项目☆22Jun 11, 2021Updated 4 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- ☆25Dec 14, 2023Updated 2 years ago
- A categorized list of system calls used by popular Unix-like operating systems☆28Feb 27, 2026Updated last week
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- This project is a fuse extent, which contains fuse-crash-recovery framework and fuse-base-ebpf performance improvement.☆26Sep 24, 2022Updated 3 years ago
- ebpf指南开源文档: eBPF基础, eBPF完全入门指南, BPF学习资料, eBPF基本架构及使用, eBPF技术背景, eBPF概念和基本原理, eBPF的实现原理, eBPF解读-基础篇, 为什么你应该关注eBPF, 初识eBPF,eBPF发展现状, 计算机领域最…☆28Jul 23, 2025Updated 7 months ago
- Java Web安全开发规范☆28Oct 10, 2023Updated 2 years ago
- Getting Started with eBPF☆27Nov 4, 2023Updated 2 years ago
- A docker environment for pwn in ctf☆21Jul 12, 2023Updated 2 years ago
- Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection☆28Aug 26, 2024Updated last year