电子科技大学计算机科学与工程学院信息安全专业课件(部分)
☆34Sep 7, 2020Updated 5 years ago
Alternatives and similar repositories for UESTC_Courseware
Users that are interested in UESTC_Courseware are comparing it to the libraries listed below
Sorting:
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- ☆12Jun 20, 2022Updated 3 years ago
- MA-VAE: Multi-head attention-based variational autoencoder approach for anomaly detection in multivariate time-series applied to automoti…☆11May 28, 2024Updated last year
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- Extensive tutorials for the Advanced NLP Workshop in Open Data Science Conference Europe 2020. We will leverage deep learning and deep tr…☆51Jun 14, 2023Updated 2 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated last month
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Deep learning neural network for calculating cosine similarity between two image encodings☆19Jul 12, 2023Updated 2 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- ☆13Aug 31, 2024Updated last year
- Iot-vulhub 自建镜像版☆11May 1, 2022Updated 3 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- This project is to test the adversarial training method with TextCNN text classification model.☆12Jul 8, 2021Updated 4 years ago
- Implements the algorithm form "Sparse logistic principal components analysis for binary data"☆14Dec 11, 2013Updated 12 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse en…☆16Jan 7, 2024Updated 2 years ago
- DIVA: A Dirichlet Process Mixtures Based Incremental Deep Clustering Algorithm via Variational Auto-Encoder☆13Sep 18, 2023Updated 2 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- [AAAI2023] NAS-LID: Efficient Neural Architecture Search with Local Intrinsic Dimension☆17Dec 20, 2022Updated 3 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- 为天池数据竞赛写的自动化特征工程和训练工具,可以通过配置的方式从mysql数据库中生成特征。同时重新封装了数据,特征和模型,使其可以被自动化测试系统识别及调用。待完成的工作:自动化测试系统的调度关键技术。☆12Dec 6, 2015Updated 10 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- Fuzz-introspector has moved (but is actively maintained) - please follow the project here https://github.com/ossf/fuzz-introspector☆14Dec 3, 2021Updated 4 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Recent Fuzzing Paper☆16Jan 5, 2023Updated 3 years ago