locnguyen21 / Android-Malware-Dectection
Using Android Malware Dataset (CICAndMal2017)
☆10Updated 5 years ago
Alternatives and similar repositories for Android-Malware-Dectection
Users that are interested in Android-Malware-Dectection are comparing it to the libraries listed below
Sorting:
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Updated 4 years ago
- ☆18Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- ☆25Updated 11 months ago
- ☆10Updated last year
- 布谷鸟异构图构建,对比学习☆11Updated 2 years ago
- ☆12Updated 3 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆21Updated last year
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆10Updated 3 years ago
- ☆11Updated 3 years ago
- source code for USENIX Security paper xNIDS☆41Updated 8 months ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- AAAI'25 Main Technical Track Paper: Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆27Updated 4 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆9Updated 9 months ago
- ☆22Updated 3 years ago
- ☆24Updated 6 months ago
- A tunneled flooding traffic detection system.☆19Updated 5 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- 利用强化学习方法 DQN 生成基于机器学习的恶意流量检测模型☆27Updated 3 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆210Updated last year
- ☆23Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆66Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆32Updated 9 months ago
- 将大容量PCAP按流切分成小PCAP☆22Updated last year
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆20Updated last year
- ☆48Updated 3 years ago
- ☆19Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 2 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year