☆28Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for Datacon2019-Malicious-Code-DataSet-Stage1
Users that are interested in Datacon2019-Malicious-Code-DataSet-Stage1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 14, 2019Updated 6 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆21Nov 30, 2020Updated 5 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Mar 14, 2021Updated 5 years ago
- ☆25Nov 22, 2021Updated 4 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Oct 13, 2020Updated 5 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆29Jan 22, 2024Updated 2 years ago
- Kaggle微软恶意代码分类☆152May 23, 2020Updated 5 years ago
- Netgpt: Generative pretrained transformer for network traffic☆32Jan 10, 2025Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆54Feb 17, 2026Updated last month
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆60Nov 5, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DeepLocker - Deep learning based malware☆36Nov 7, 2018Updated 7 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆15Mar 10, 2024Updated 2 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- ☆10Mar 5, 2016Updated 10 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- Code release for paper "How good is my GAN?"☆12Mar 9, 2019Updated 7 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 中国科学信息科学latex模板。可以在texlive 2014 + texstudio下使用☆10Aug 2, 2015Updated 10 years ago
- ☆89Feb 1, 2021Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- ☆50Jan 19, 2019Updated 7 years ago
- Implementation of 'A Convolutional Attention Network for Extreme Summarization of Source Code'☆15Mar 14, 2019Updated 7 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆39Jul 25, 2021Updated 4 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Mar 25, 2023Updated 3 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- ☆11Feb 13, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Detecting software vulnerability described public security reports with minimal training examples☆14Jun 11, 2021Updated 4 years ago
- 自己ctf比赛的writeup☆19May 27, 2019Updated 6 years ago
- 中文命名体识别,采用pytorch官方提供的BiLSTM+CRF☆15Mar 29, 2019Updated 7 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Blockchain federated learning☆14Sep 26, 2022Updated 3 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning☆17Mar 9, 2022Updated 4 years ago