lxyeternal / Paper-Reading
主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。
☆12Updated 2 years ago
Alternatives and similar repositories for Paper-Reading:
Users that are interested in Paper-Reading are comparing it to the libraries listed below
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆206Updated 9 months ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated 9 months ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆128Updated last year
- ☆80Updated 4 years ago
- VulDeePecker algorithm implemented in Python☆110Updated 5 years ago
- Usenix Security'23☆14Updated 2 years ago
- ☆45Updated 6 years ago
- Vulnerability knowledge graph construction☆20Updated 2 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆155Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆95Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆80Updated 2 years ago
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆10Updated 6 years ago
- ☆102Updated last year
- Data Mining for Cybersecurity☆74Updated 2 years ago
- vulnerability detection in python source code with LSTM networks☆132Updated 4 years ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆52Updated last year
- ☆69Updated last year
- ☆17Updated 9 months ago
- ☆11Updated 3 years ago
- ☆71Updated last year
- ☆33Updated this week
- 用于应用密码学课程课程实践,编写一个发送端程序和一个接收端程序,接收端要完成对消息的验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。☆17Updated 5 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆28Updated this week
- 广州大学方班课程&学习资源共享计划☆69Updated 3 years ago
- ☆195Updated 6 months ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆29Updated 6 months ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year
- Academic Papers about LLM Application on Security☆122Updated 2 weeks ago
- ☆23Updated 2 years ago
- Labeled vulnerable functions statistics analysis and neural network training☆25Updated 5 years ago