lindsey98 / PhishingBaseline
Implementations of 3 phishing detection and identification baselines
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for PhishingBaseline
- PhishIntention: Phishing detection through webpage intention☆48Updated 3 months ago
- ☆22Updated 2 years ago
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆128Updated this week
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆13Updated 5 months ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆30Updated 2 years ago
- NLP model and tech for cyber security tasks☆80Updated last year
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆129Updated last year
- ☆73Updated last year
- ☆17Updated 2 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆37Updated 5 months ago
- ☆12Updated 9 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- ☆23Updated 2 years ago
- ☆22Updated 4 years ago
- Traffic analysis for Tor-based malware detection and classification☆38Updated last year
- ☆27Updated 4 years ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆18Updated 8 months ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated 7 months ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆10Updated last week
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆62Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 7 years ago
- AI: Deep Learning for Phishing URL Detection☆49Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆24Updated 4 years ago