imethanlee / KnowPhish
[USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection'
☆11Updated last week
Alternatives and similar repositories for KnowPhish:
Users that are interested in KnowPhish are comparing it to the libraries listed below
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆20Updated 10 months ago
- Implementations of 3 phishing detection and identification baselines☆17Updated 3 months ago
- Replication Package for "Compressing Pre-trained Models of Code into 3 MB", ASE 2022☆27Updated 4 months ago
- CyberAttack Sensing and Information Extraction☆71Updated 2 months ago
- ☆33Updated 7 months ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆14Updated 8 months ago
- Official repository for MalKG☆20Updated 4 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆13Updated 3 years ago
- Corpus of auto-labeled text for the cyber security domain☆94Updated 5 years ago
- ☆16Updated 2 years ago
- ☆33Updated 7 months ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆27Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆37Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆63Updated last year
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆11Updated last year
- Source Code Data Augmentation for Deep Learning: A Survey.☆64Updated 8 months ago
- Deep Just-In-Time Inconsistency Detection Between Comments and Source Code: Artifact☆21Updated 2 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 4 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆48Updated 3 months ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆33Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 8 months ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆32Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆44Updated 5 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆87Updated last year
- ☆43Updated 2 years ago
- ☆27Updated last year
- No More Manual Tests? Evaluating and Improving ChatGPT for Unit Test Generation☆16Updated last year
- This repo is the benchmark for source code summarization on C language☆25Updated 3 years ago
- Code for the paper: "Adversarial Examples for Models of Code"☆17Updated 4 years ago