robshahla / VisQUICLinks
☆14Updated 11 months ago
Alternatives and similar repositories for VisQUIC
Users that are interested in VisQUIC are comparing it to the libraries listed below
Sorting:
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 8 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆15Updated 9 months ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Updated 4 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆25Updated 2 years ago
- ☆26Updated last year
- ☆15Updated 2 years ago
- A CLI tool for creating network covert channels within .pcap files.☆13Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Updated 2 years ago
- ☆12Updated 5 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 5 years ago
- ☆25Updated 2 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆20Updated 6 months ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆159Updated 3 months ago
- IPv6 Internet Wide Scanning☆25Updated 8 months ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆57Updated last week
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 4 years ago
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- ☆18Updated 3 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆21Updated 5 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆55Updated last month
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- ☆22Updated 5 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Updated last year
- A tunneled flooding traffic detection system.☆30Updated last year
- ☆27Updated 3 years ago
- ☆21Updated last year
- Implementation of "Website Fingerprinting at Internet Scale"☆23Updated 2 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Updated 2 years ago