qmdnls / ADM19F-bot-detection
Leveraging network topology for better fake account detection in social networks
☆10Updated last year
Alternatives and similar repositories for ADM19F-bot-detection:
Users that are interested in ADM19F-bot-detection are comparing it to the libraries listed below
- A tunneled flooding traffic detection system.☆15Updated 4 months ago
- 布谷鸟异构图构建,对比学习☆11Updated 2 years ago
- ☆12Updated 3 years ago
- ☆19Updated 4 years ago
- Insider threat detection via bert☆19Updated 3 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Updated 6 years ago
- ☆13Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆24Updated 5 months ago
- ☆52Updated last year
- ☆16Updated 9 months ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆70Updated 3 years ago
- Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature Attribution…☆9Updated 8 months ago
- dataset of encrypted network traffic☆11Updated 7 years ago
- ☆16Updated 6 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆11Updated last year
- ☆13Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Updated 7 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆33Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated last year
- 疫情期间互联网虚假新闻检测实现代码和解析☆13Updated 4 years ago
- Packet Representation Learning for Traffic Classification☆28Updated 4 months ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆25Updated 3 years ago
- ☆46Updated 3 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆22Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆66Updated 2 years ago
- Group review spammer detection☆10Updated 5 years ago
- ☆24Updated 5 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago