seclab-ucr / ThemisLinks
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆23Updated 2 years ago
Alternatives and similar repositories for Themis
Users that are interested in Themis are comparing it to the libraries listed below
Sorting:
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- ☆34Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- AI安全☆35Updated 5 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆36Updated 2 years ago
- Open-source code for RFCNLP paper.☆58Updated 3 years ago
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆72Updated 9 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆38Updated 4 months ago
- TensorFlow API analysis tool and malicious model detection tool☆37Updated 7 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 8 months ago
- A collection of security papers on top-tier publications☆59Updated last week
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- DiAne is a smart fuzzer for IoT devices☆42Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- The scalable bug search for binaries☆70Updated 9 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- ☆13Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Updated 2 years ago
- Codee☆17Updated 5 years ago
- ☆30Updated 8 months ago
- ☆52Updated 5 years ago
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Updated 4 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- ☆14Updated last year