lindsey98 / PhishingBaseline
Implementations of 3 phishing detection and identification baselines
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for PhishingBaseline
- PhishIntention: Phishing detection through webpage intention☆47Updated 2 months ago
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆124Updated 2 weeks ago
- NLP model and tech for cyber security tasks☆78Updated last year
- ☆22Updated 2 years ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆12Updated 5 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆30Updated 2 years ago
- ☆22Updated 4 years ago
- ☆73Updated last year
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆36Updated 4 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆128Updated last year
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- ☆23Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆47Updated 5 months ago
- Adversarial machine learning and explainable machine learning for cyber security☆10Updated 2 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated 7 months ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆77Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆15Updated 2 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆24Updated 4 years ago
- Datasets used in the StreamSpot experiments☆50Updated 8 years ago
- Traffic analysis for Tor-based malware detection and classification☆38Updated last year
- ☆18Updated 3 years ago
- ☆12Updated 2 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago