lindsey98 / PhishingBaseline
Implementations of 3 phishing detection and identification baselines
☆17Updated 4 months ago
Alternatives and similar repositories for PhishingBaseline:
Users that are interested in PhishingBaseline are comparing it to the libraries listed below
- ☆25Updated 3 years ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆16Updated 10 months ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- ☆76Updated 2 years ago
- ☆103Updated 4 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated 2 weeks ago
- AI: Deep Learning for Phishing URL Detection☆52Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆34Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated 2 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆38Updated 9 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆35Updated 9 months ago
- ☆22Updated 5 years ago
- ☆22Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆50Updated 10 months ago
- Feature extraction for CERT insider threat test dataset☆89Updated 6 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆80Updated last year
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- ☆14Updated 4 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆64Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆15Updated 3 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago