Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggio, and Asaf Shabtai, SAC 2021.
☆14Mar 22, 2021Updated 5 years ago
Alternatives and similar repositories for poisoning-ics-ad
Users that are interested in poisoning-ics-ad are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AutoEncoders for Event Detection (AEED): a Keras-based class for anomaly detection in water sensor networks.☆12Sep 17, 2018Updated 7 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated 11 months ago
- ☆31Feb 15, 2017Updated 9 years ago
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆15Oct 20, 2022Updated 3 years ago
- ☆23May 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆15Oct 20, 2020Updated 5 years ago
- AndroidSlicer is a dynamic slicing tool, useful for a variety of tasks, from testing to debugging to security.☆14Jul 28, 2019Updated 6 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Dr. Orbiteex - TLE/OEM 3D/2D viewer and analyser☆13Jul 14, 2024Updated last year
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Static Jimple Slicer for Android Apps☆13Dec 2, 2021Updated 4 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Mar 1, 2017Updated 9 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- Android Benchmark Reproduction Framework☆13Nov 30, 2021Updated 4 years ago
- MQTT Security Testing☆24Jul 26, 2022Updated 3 years ago
- ☆15Jan 30, 2025Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆17Mar 22, 2019Updated 7 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- Jekyll template for simple workshop website, Bootstrap version☆11Sep 22, 2025Updated 6 months ago
- ☆13Dec 22, 2021Updated 4 years ago
- Public Code for ICS Evasion Attack Generation☆43Apr 23, 2021Updated 4 years ago
- Random Code☆25Apr 18, 2011Updated 15 years ago
- ADCS simulations for the AcubeSAT nanosatellite☆15Oct 6, 2025Updated 6 months ago
- Siemens Simatic S7 Metasploit Modules☆41Jul 14, 2012Updated 13 years ago
- Mandoline is an accurate, low-overhead dynamic slicer for Android applicaions.☆11Dec 24, 2025Updated 3 months ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Waffle is a library for integrating a Web Application Firewall (WAF) into Go applications.☆18Updated this week
- Industrial Security Scripts☆145Mar 1, 2026Updated last month
- LLM-Powered Data Discovery System for Tabular Data☆27Apr 7, 2026Updated last week
- SpeakControl 是基于ssfrpa开发的可自定义任意指令的语音控制,指令可以是简单的运行某程序、也可以是复杂流程逻辑。☆20Jul 13, 2025Updated 9 months ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆16Jul 24, 2021Updated 4 years ago
- Source code of paper "EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications"☆16May 14, 2025Updated 11 months ago
- This project implements a Reinforcement Learning (RL) enhanced Retrieval-Augmented Generation (RAG) system that optimizes document retrie…☆24Apr 27, 2025Updated 11 months ago