seclab-ucr / ThemisView external linksLinks
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆23Mar 4, 2023Updated 2 years ago
Alternatives and similar repositories for Themis
Users that are interested in Themis are comparing it to the libraries listed below
Sorting:
- ☆18Nov 7, 2024Updated last year
- ☆15Sep 14, 2022Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆20Apr 24, 2025Updated 9 months ago
- Code and Datasets for the paper "An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape" [IEEE S&P, 2…☆20Jul 23, 2025Updated 6 months ago
- ☆25Mar 26, 2025Updated 10 months ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Jan 20, 2025Updated last year
- ☆33Jun 5, 2023Updated 2 years ago
- MATLAB/Octave generator of Hamming ECC coding. Output format is Verilog HDL.☆11Dec 27, 2022Updated 3 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆136Oct 30, 2023Updated 2 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Fork of Triton repository for OpenXLA uses of the Triton language and compiler☆15Feb 6, 2026Updated last week
- "PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks" ACM ASIACCS 2…☆13Jun 28, 2024Updated last year
- ☆12Aug 26, 2016Updated 9 years ago
- Handles OpenDocument files and translates them to HTML.☆10Oct 8, 2019Updated 6 years ago
- Verilog implementation of MC68851 Memory Management Unit☆13Feb 26, 2018Updated 7 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆17Updated this week
- Traffic analysis for Tor-based malware detection and classification☆42Jun 20, 2023Updated 2 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago
- ☆16Aug 19, 2024Updated last year
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Oldest Delphi sources of crypto-application (find in web archive)☆10Nov 23, 2016Updated 9 years ago
- Mining Server Detector of Cryptocurrency Pools☆10Jan 5, 2023Updated 3 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 3 months ago
- Jumpstart your custom DNN accelerator today. This project holds scripts to build and start containers that can compile binaries to the ze…☆10Jun 17, 2020Updated 5 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- ☆16Dec 1, 2024Updated last year
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Using Android Malware Dataset (CICAndMal2017)☆10Jul 23, 2019Updated 6 years ago