kevin-w-du / BookCodeLinks
Source code for my books
☆163Updated 2 years ago
Alternatives and similar repositories for BookCode
Users that are interested in BookCode are comparing it to the libraries listed below
Sorting:
- Records & Reports for Seed-project☆95Updated 4 years ago
- SEED Labs developed in the last 20 years.☆842Updated 3 weeks ago
- Chinese translation of the SEED Labs☆51Updated 8 months ago
- A Python framework for creating emulation of the Internet.☆250Updated last month
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆118Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆22Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆21Updated 2 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆193Updated 2 years ago
- ☆22Updated 5 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆241Updated 3 years ago
- 每日论文推荐☆291Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- research and survey papers related to IoT security from 2014 to the first half of 2019☆59Updated 4 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆52Updated 2 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆47Updated 4 years ago
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆29Updated 5 years ago
- Material from the DARPA Transparent Computing Program☆193Updated 5 years ago
- Data Mining for Cybersecurity☆77Updated 2 years ago
- IoT Security Reading List☆62Updated 5 years ago
- A malware family classification model based on CNN☆25Updated 2 years ago
- A logic-based enterprise network security analyzer☆125Updated 2 years ago
- Trending Research Topics In Cybersecurity☆20Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- ☆30Updated 4 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆209Updated last year
- Have fun with audit log analysis :)☆152Updated last year
- ☆22Updated last year