lxyeternal / Paper-ReadingLinks
主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。
☆13Updated 3 years ago
Alternatives and similar repositories for Paper-Reading
Users that are interested in Paper-Reading are comparing it to the libraries listed below
Sorting:
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆211Updated last year
- 广州大学方班课程&学习资源共享计划☆71Updated 3 years ago
- VulDeePecker algorithm implemented in Python☆114Updated 6 years ago
- A paper list of vulnerability detection using deep learning (updating)☆13Updated last year
- Usenix Security'23☆16Updated 2 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对 大家有所帮助~☆160Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆10Updated 6 years ago
- ☆117Updated 2 years ago
- ☆46Updated 6 years ago
- Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks☆231Updated last year
- ☆85Updated 4 years ago
- ☆340Updated 9 months ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 11 months ago
- ☆11Updated 3 years ago
- A deep learning-based vulnerability detection framework☆76Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆165Updated 2 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆103Updated 3 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆229Updated last week
- vulnerability detection in python source code with LSTM networks☆147Updated 5 years ago
- ☆75Updated 2 years ago
- ☆89Updated last year
- Data Mining for Cybersecurity☆78Updated 3 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆331Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆82Updated 2 years ago
- ☆27Updated 2 years ago
- 基于溯源 图的入侵/威胁检测相关论文及阅读笔记☆22Updated last year
- ☆46Updated last year
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆110Updated 3 years ago