☆14Jul 26, 2019Updated 6 years ago
Alternatives and similar repositories for AttackGraphGeneration
Users that are interested in AttackGraphGeneration are comparing it to the libraries listed below
Sorting:
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Attack graph construction and analysis☆36May 18, 2019Updated 6 years ago
- ☆32Jan 28, 2021Updated 5 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- 毕设项目,项目名称为轻松买比价网,通过爬虫获取各大电商平台中特定的商品的价格图片等数据,并在本系统中进行比价展示。 系统主要分为3个模块,用户模块,搜索模块,商品模块。☆13Oct 10, 2022Updated 3 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- [ICCV 2025] "Player-Centric Multimodal Prompt Generation for Large Language Model Based Identity-Aware Basketball Video Captioning".☆16Dec 11, 2025Updated 2 months ago
- Minimal hitting set solver in Python☆11Dec 15, 2018Updated 7 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- ☆14Dec 7, 2025Updated 2 months ago
- 网络爬虫(又称为网页蜘蛛,网络机器人,在FOAF社区中间,更经常的称为网页追逐者),是一种按照一定的规则,自动地抓取万维网信息的程序或者脚本。另外一些不常使用的名字还有蚂蚁、自动索引、模拟程序或者蠕虫。☆10Aug 2, 2023Updated 2 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- Python implementation of variable enumeration and variable elimination algorithms for exact inference in probabilistic Bayesian networks.☆11Jun 9, 2014Updated 11 years ago
- ☆16Aug 19, 2024Updated last year
- ☆10Oct 17, 2020Updated 5 years ago
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 2 years ago
- ☆11May 3, 2023Updated 2 years ago
- A Tool-Chain for Quantitative Evaluation of Uncertainty-Aware Hybrid AADL Designs☆11Apr 28, 2017Updated 8 years ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14May 15, 2022Updated 3 years ago
- XSB Prolog☆14Mar 27, 2010Updated 15 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- 碩論:基於Word2Vec之熱門主題偵測☆11Oct 24, 2017Updated 8 years ago
- 学小易的pc搜题工具。使用airtest+python他会实时监听您的剪贴板,并将剪贴板中的文字或图片自动送给学小易进行搜索~☆10May 6, 2022Updated 3 years ago
- 基于SpringCloud的配置中心。支持从自研配置中心拉取配置,并在配置发生变更时同步修改本地环境配置。☆11Jun 28, 2024Updated last year
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- ☆13Oct 27, 2022Updated 3 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- LLM for System/Software Security☆23Dec 29, 2024Updated last year
- Anomaly detection is a critical step towards building a secure and trustworthy system. The primary purpose of a system log is to record s…☆14Dec 7, 2021Updated 4 years ago
- Assume-Guarantee REasoning Environment☆20Dec 3, 2025Updated 2 months ago
- ☆16Apr 15, 2019Updated 6 years ago
- ☆14Sep 29, 2015Updated 10 years ago
- baseline method HGN, just like SASRec, change its evaluation to be the same as SASRec☆12Aug 19, 2019Updated 6 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 5 months ago
- Source code for the following paper(arXiv link): Improved Actor Relation Graph based Group Activity Recognition Zijian Kuang, Xinran Tie☆15Jan 19, 2022Updated 4 years ago
- M.H.S algorithms encoded☆12Jun 14, 2016Updated 9 years ago
- Automated Analysis Framework for Simulink/Stateflow☆16Jul 25, 2023Updated 2 years ago