leocsato / detector_mwView external linksLinks
Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.
☆15Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for detector_mw
Users that are interested in detector_mw are comparing it to the libraries listed below
Sorting:
- ☆14Jul 14, 2019Updated 6 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- ☆11Nov 10, 2020Updated 5 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 6 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- mender with LUKS encrypted partitions☆19Dec 16, 2025Updated last month
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- ☆12Aug 8, 2019Updated 6 years ago
- Documentation for srsRAN Project, an open-source 5G CU/DU solution.☆16Nov 6, 2025Updated 3 months ago
- implement simple OFDM system using C☆13Nov 11, 2015Updated 10 years ago
- ☆15Jul 28, 2021Updated 4 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- https://hackaday.io/project/181521-freeeeg128-alpha☆15Sep 6, 2022Updated 3 years ago
- Verilog IP Cores & Tests☆13May 3, 2018Updated 7 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Mar 1, 2024Updated last year
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 3 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- Serverless federated learning using flwr☆13Nov 6, 2024Updated last year
- Large-Scale Sequence Mining with Hierarchies☆13Mar 13, 2015Updated 10 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- 对抗训练在NLP中的应用☆14Nov 22, 2021Updated 4 years ago
- ☆19Sep 9, 2024Updated last year
- MurPhySDR is an open source software-defined radio platform based on the AD9364 transceiver IC.☆14Jul 9, 2024Updated last year
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆14Aug 9, 2023Updated 2 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Sep 23, 2021Updated 4 years ago
- ☆14Mar 2, 2021Updated 4 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- User space file system extension to protect from data leakage. This is code associated to a research paper published at https://arxiv.org…☆18Sep 17, 2025Updated 4 months ago
- Sequential Pattern Mining - PrefixSpan - Fitting the implementation of Tianming Lu with the Spark MLlib Python API☆14Oct 15, 2016Updated 9 years ago