omid-s / cyber_deceptionView external linksLinks
☆14Mar 2, 2021Updated 4 years ago
Alternatives and similar repositories for cyber_deception
Users that are interested in cyber_deception are comparing it to the libraries listed below
Sorting:
- ☆102Nov 26, 2020Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆227Apr 29, 2020Updated 5 years ago
- Datasets used in the StreamSpot experiments☆66Feb 18, 2016Updated 9 years ago
- ☆14Mar 31, 2019Updated 6 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆41Apr 23, 2020Updated 5 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Detect Sql Injection by Machine Learning☆18Jan 8, 2020Updated 6 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- This repository contains the TensorFlow implemtation of subgraph2vec (KDD MLG 2016) paper☆25Oct 13, 2017Updated 8 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 2 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Contains the code (and working vm setup) for our KDD MLG 2016 paper titled: "subgraph2vec: Learning Distributed Representations of Rooted…☆42Apr 29, 2017Updated 8 years ago
- ☆11May 24, 2022Updated 3 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- Simple implementation of CoveringLSH☆10Jan 22, 2016Updated 10 years ago
- Official implementation for paper "FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning" (NeurIPS 2023).☆13Oct 25, 2024Updated last year
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- ☆12Nov 6, 2017Updated 8 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆12Feb 18, 2021Updated 4 years ago
- PROVED (PRocess mining OVer uncErtain Data) is a library of functionalities to perform process mining on uncertain event data.☆12Jan 12, 2023Updated 3 years ago
- Android APK Crawler☆10Nov 8, 2017Updated 8 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆10Aug 12, 2025Updated 6 months ago
- make a LLVM Toy RISC-V backend step by step☆11Feb 28, 2024Updated last year