☆14Mar 2, 2021Updated 5 years ago
Alternatives and similar repositories for cyber_deception
Users that are interested in cyber_deception are comparing it to the libraries listed below
Sorting:
- ☆103Nov 26, 2020Updated 5 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆192Jan 6, 2026Updated 2 months ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Datasets used in the StreamSpot experiments☆66Feb 18, 2016Updated 10 years ago
- ☆14Mar 31, 2019Updated 6 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆41Apr 23, 2020Updated 5 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Detect Sql Injection by Machine Learning☆18Jan 8, 2020Updated 6 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- This repository contains the TensorFlow implemtation of subgraph2vec (KDD MLG 2016) paper☆25Oct 13, 2017Updated 8 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- ☆147Nov 17, 2020Updated 5 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- ☆37Dec 4, 2019Updated 6 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆11May 24, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- Contains the code (and working vm setup) for our KDD MLG 2016 paper titled: "subgraph2vec: Learning Distributed Representations of Rooted…☆42Apr 29, 2017Updated 8 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- PROVED (PRocess mining OVer uncErtain Data) is a library of functionalities to perform process mining on uncertain event data.☆12Jan 12, 2023Updated 3 years ago
- ☆12Feb 18, 2021Updated 5 years ago