seclab-ucr / ThemisView external linksLinks
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆23Mar 4, 2023Updated 2 years ago
Alternatives and similar repositories for Themis
Users that are interested in Themis are comparing it to the libraries listed below
Sorting:
- ☆18Nov 7, 2024Updated last year
- ☆15Sep 14, 2022Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆25Mar 26, 2025Updated 10 months ago
- Code and Datasets for the paper "An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape" [IEEE S&P, 2…☆20Jul 23, 2025Updated 6 months ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 2 months ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆52Sep 3, 2025Updated 5 months ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- TinyTapeout-01 submission repo☆32Nov 28, 2022Updated 3 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆84Jan 20, 2025Updated last year
- ☆34Jun 5, 2023Updated 2 years ago
- 记录我的安全学术学习☆129Dec 15, 2020Updated 5 years ago
- MATLAB/Octave generator of Hamming ECC coding. Output format is Verilog HDL.☆11Dec 27, 2022Updated 3 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Verilog implementation of MC68851 Memory Management Unit☆13Feb 26, 2018Updated 7 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 8 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- "PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks" ACM ASIACCS 2…☆13Jun 28, 2024Updated last year
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆17Updated this week
- ☆12Aug 26, 2016Updated 9 years ago
- ☆22Aug 29, 2025Updated 5 months ago
- Handles OpenDocument files and translates them to HTML.☆10Oct 8, 2019Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Traffic analysis for Tor-based malware detection and classification☆42Jun 20, 2023Updated 2 years ago
- ☆47Oct 28, 2021Updated 4 years ago
- LaukvikCSV is a powerful API for reading, writing and querying tabular data stored in the CSV format. In contrast to other API it lets yo…☆10Feb 25, 2022Updated 3 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 3 months ago
- Testing utilities for FreeType.☆14Updated this week
- An educational SAT solver written in Rust☆13Sep 23, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago