locnguyen21 / Android-Malware-DectectionLinks
Using Android Malware Dataset (CICAndMal2017)
☆10Updated 6 years ago
Alternatives and similar repositories for Android-Malware-Dectection
Users that are interested in Android-Malware-Dectection are comparing it to the libraries listed below
Sorting:
- ☆11Updated last year
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Updated 4 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- A tunneled flooding traffic detection system.☆26Updated 8 months ago
- ☆22Updated last year
- ☆11Updated 3 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- ☆28Updated last year
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- Traffic analysis for Tor-based malware detection and classification☆41Updated 2 years ago
- ☆26Updated 6 years ago
- 基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践☆30Updated 4 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆102Updated 4 years ago
- ☆13Updated 3 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆17Updated 4 years ago
- 将大容量PCAP按流切分成小PCAP☆23Updated 2 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆213Updated last year
- ☆12Updated last year
- ☆20Updated 4 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆23Updated last year
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆14Updated 3 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆21Updated 4 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- 机器学习检测恶意URL改进版☆26Updated 5 years ago
- Datasets used in the StreamSpot experiments☆61Updated 9 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆161Updated last year
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆36Updated 2 months ago