The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.
☆34Dec 9, 2024Updated last year
Alternatives and similar repositories for DynamicMalwareAnalysis
Users that are interested in DynamicMalwareAnalysis are comparing it to the libraries listed below
Sorting:
- ☆32Jul 22, 2022Updated 3 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- Intuitionistic Fuzzy Broad Learning System: Enhancing Robustness Against Noise and Outliers☆11Oct 26, 2025Updated 4 months ago
- 西安财经大学18级软件工程1802杨致远的优秀毕设,开源的目的是为了共同学习进步,最终解释权全归创作者所有☆11Mar 2, 2023Updated 2 years ago
- This GitHub repository contains an implementation of a malware classification/detection system using Convolutional Neural Networks (CNNs)…☆42Jul 19, 2023Updated 2 years ago
- A neural approach to malware detection in portable executables☆80Mar 20, 2023Updated 2 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- A Python implementation of improved Label Propagation Algorithm.☆11May 26, 2021Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Sep 23, 2022Updated 3 years ago
- Sophos-ReversingLabs 20 million sample dataset☆691Apr 7, 2021Updated 4 years ago
- 南方科技大学图书馆LaTeX培训讲座,⬇️是讨论区☆10Sep 7, 2021Updated 4 years ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- Just found a new AI product; oh! With waitlist :)☆12Oct 11, 2023Updated 2 years ago
- 一款H5打包的修仙类游戏!☆12Mar 14, 2018Updated 7 years ago
- exploit-db备份☆14Jan 5, 2022Updated 4 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Ecg experiment, including Fourier transform, wavelet transform, wavelet decomposition and LSTM feature extraction. Emotion classification…☆11Jul 17, 2020Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- 從網上找到的《泥潭6》mudlib源碼☆11May 23, 2018Updated 7 years ago
- This code is to implement the model-free control algorithm as introduced in the paper Model-free control by Michel Fliess and Cedric Join…☆13Nov 29, 2017Updated 8 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- A collection of Linux Malware Detection projects (research paper implementations) done by me.☆11Jan 6, 2019Updated 7 years ago
- 从0到1搭建一个商品管理系统☆11Dec 16, 2022Updated 3 years ago
- ☆11Jul 10, 2022Updated 3 years ago
- Code for the paper "Fuzzy c-Means Clustering for Persistence Diagrams"☆14Oct 14, 2023Updated 2 years ago
- 有趣,免费的 newsletter,欢迎推荐☆10Aug 20, 2025Updated 6 months ago
- ☆10Jun 16, 2022Updated 3 years ago
- Large-scale Data Classification based on the Integrated Fusion of Fuzzy Learning and Graph Neural Network☆13Nov 2, 2023Updated 2 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Jul 8, 2024Updated last year
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago