Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)
☆42Apr 23, 2020Updated 6 years ago
Alternatives and similar repositories for sbustreamspot-core
Users that are interested in sbustreamspot-core are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- ☆25Dec 4, 2020Updated 5 years ago
- ☆28Dec 10, 2021Updated 4 years ago
- ☆101Nov 26, 2020Updated 5 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Mar 2, 2021Updated 5 years ago
- ☆112Aug 23, 2023Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆84Jun 6, 2023Updated 2 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆195Updated this week
- ☆27Jun 25, 2021Updated 4 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 11 years ago
- Have fun with audit log analysis :)☆155May 5, 2024Updated 2 years ago
- Anomaly Detection in Dynamic Graphs☆32Nov 1, 2023Updated 2 years ago
- ☆15Mar 31, 2019Updated 7 years ago
- 用于图异常检测的数据集☆45Jan 17, 2020Updated 6 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- Probabilistic Sequence Mining☆46Apr 25, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The AutoPath pipeline for similarity modeling on heterogeneous networks with automatic path discovery☆11Sep 12, 2019Updated 6 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Semantic Proximity Search on Heterogeneous Graph by Proximity Embedding☆15Feb 20, 2018Updated 8 years ago
- ☆15Aug 12, 2023Updated 2 years ago
- ☆59Jul 10, 2019Updated 6 years ago
- ☆16Jan 24, 2025Updated last year
- ☆21Oct 31, 2020Updated 5 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Oct 7, 2023Updated 2 years ago
- ☆15Jun 13, 2024Updated last year
- ☆10Jul 2, 2020Updated 5 years ago
- neural_topic_models☆11Jan 9, 2017Updated 9 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- ☆20Mar 31, 2019Updated 7 years ago