lxyeternal / Paper-ReadingLinks
主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。
☆13Updated 3 years ago
Alternatives and similar repositories for Paper-Reading
Users that are interested in Paper-Reading are comparing it to the libraries listed below
Sorting:
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆219Updated last year
- 广州大学方班课程&学习资源共享计划☆74Updated 3 years ago
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆10Updated 7 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Updated 2 years ago
- VulDeePecker algorithm implemented in Python☆113Updated 6 years ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated last year
- ☆50Updated 6 years ago
- ☆345Updated last year
- ☆11Updated 3 years ago
- ☆87Updated 4 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆112Updated 3 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆29Updated 2 years ago
- Automated Web Penetration Testing Assistant Based on Function Calling and Multi Agent.☆135Updated 8 months ago
- Vulnerability knowledge graph construction☆28Updated 2 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆279Updated this week
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆165Updated 2 years ago
- ☆79Updated 2 years ago
- vulnerability detection in python source code with LSTM networks☆151Updated 5 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆342Updated 5 years ago
- Usenix Security'23☆16Updated 2 years ago
- Data Mining for Cybersecurity☆78Updated 3 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆57Updated 2 years ago
- ☆27Updated 3 years ago
- A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries☆349Updated 4 years ago
- software defect prediction☆11Updated 2 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆249Updated last year
- ☆42Updated 3 months ago
- ☆220Updated last year
- ☆123Updated 2 years ago