ivan-homoliak-sutd / twosView external linksLinks
☆16Apr 3, 2020Updated 5 years ago
Alternatives and similar repositories for twos
Users that are interested in twos are comparing it to the libraries listed below
Sorting:
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 6 years ago
- Official GitHub repo for Learning Normal Flow Directly from Event Neighborhoods (ICCV2025). It is an easy-to-use API for event-based norm…☆18Oct 5, 2025Updated 4 months ago
- ☆147Nov 17, 2020Updated 5 years ago
- Neural embeddings with negative sampling in Keras☆11Jun 11, 2017Updated 8 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Outlier Detection to detect DNS Tunnelling☆11Oct 8, 2018Updated 7 years ago
- ☆12Sep 25, 2025Updated 4 months ago
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- 科研日志模板☆15May 8, 2025Updated 9 months ago
- ☆10May 9, 2016Updated 9 years ago
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Implementation of algorithms proposed by [Huang and Kasiviswanathan]☆16Jul 27, 2016Updated 9 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- ☆19Sep 1, 2022Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆168Nov 6, 2025Updated 3 months ago
- maven plugin to convert java bean classes to c#☆26Mar 24, 2022Updated 3 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- Python Implementation of 'Spectral Clustering in Heterogeneous Information Networks'.☆20Nov 13, 2019Updated 6 years ago
- Python package for computing and visualizing Lagrangian Descriptors in Dynamical Systems☆23Sep 28, 2021Updated 4 years ago
- ☆24Dec 4, 2020Updated 5 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- [FSE 2019] Learning Cross-Language API Mappings with Little Knowledge☆19Jul 6, 2023Updated 2 years ago
- ☆20Oct 31, 2020Updated 5 years ago
- D-NTM paper repo☆25May 10, 2017Updated 8 years ago
- Official code and data repository of "Anomaly Detection with Score Distribution Discrimination", KDD' 23.☆23Jul 3, 2023Updated 2 years ago
- Analysis and preprocessing of the kdd cup 99 dataset using python and scikit-learn☆22Mar 11, 2020Updated 5 years ago
- offical implementation of TKDE paper "Deep isolation forest for anomaly detection"☆111Jun 17, 2024Updated last year
- Papers on trustworthy anomaly detection☆29Apr 18, 2024Updated last year
- The code of Addgraph frame.☆23Sep 29, 2021Updated 4 years ago
- Source code for the Last Millennium Reanalysis (LMR) project☆34Jun 25, 2019Updated 6 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Spectral Word Embedding Learning for Language (SWELL) toolkit☆27Jul 24, 2014Updated 11 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆41Jan 25, 2026Updated 3 weeks ago
- ☆40Jul 6, 2024Updated last year
- A collection of documents and materials for the EMNLP-2015 Semantic Similarity tutorial☆30Sep 30, 2015Updated 10 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago