lxyeternal / Paper-ReadingLinks
主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。
☆13Updated 3 years ago
Alternatives and similar repositories for Paper-Reading
Users that are interested in Paper-Reading are comparing it to the libraries listed below
Sorting:
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆210Updated last year
- VulDeePecker algorithm implemented in Python☆114Updated 6 years ago
- ☆337Updated 8 months ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- ☆84Updated 4 years ago
- 广州大学方班课程&学习资源共享计划☆71Updated 3 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆326Updated 4 years ago
- Usenix Security'23☆16Updated 2 years ago
- ☆115Updated 2 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆227Updated last year
- Data Mining for Cybersecurity☆77Updated 3 years ago
- software defect prediction☆11Updated 2 years ago
- ☆211Updated 11 months ago
- ☆26Updated 2 years ago
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆10Updated 6 years ago
- Vulnerability knowledge graph construction☆24Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 5 months ago
- ☆75Updated 2 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆25Updated 3 years ago
- ☆40Updated 2 weeks ago
- ☆20Updated last year
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆160Updated last year
- ☆46Updated 6 years ago
- ☆45Updated last year
- vulnerability detection in python source code with LSTM networks☆145Updated 5 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Updated 4 years ago
- https://github.com/SySeVR/SySeVR 项目的所需依赖和部分修改后的代码☆25Updated 5 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆310Updated 4 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆21Updated last year