smartlawhub / Automated-GDPR-Compliance-CheckingLinks
☆15Updated 4 years ago
Alternatives and similar repositories for Automated-GDPR-Compliance-Checking
Users that are interested in Automated-GDPR-Compliance-Checking are comparing it to the libraries listed below
Sorting:
- using Drebin dataset to distinguish between malwares and not malwares☆13Updated 6 years ago
- LogTAD: Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation (CIKM 2021)☆28Updated 3 months ago
- Anomaly detection using RAG☆16Updated last year
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24Updated 5 years ago
- Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection☆25Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Updated 2 years ago
- Solutions to Introduction to Algorithms☆10Updated 7 years ago
- Android malware detection using static and dynamic analysis☆39Updated 6 years ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆21Updated 10 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Updated 5 years ago
- ☆16Updated 6 years ago
- A deep learning toolkit for log-based anomaly detection☆256Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆129Updated 7 years ago
- Feature extraction for CERT insider threat test dataset☆106Updated last year
- Implementation of IEEE paper: Malware Classification with Deep Convolutional Neural Networks☆17Updated 6 years ago
- ☆45Updated 2 years ago
- Implementation of PLELog in ICSE 2021 accepted paper:Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation.☆80Updated 2 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Updated 4 years ago
- Log Parsing with Prompt-based Few-shot Learning (ICSE 2023, Technical Track)☆68Updated 3 months ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Updated 5 years ago
- ☆20Updated 4 years ago
- source code for USENIX Security paper xNIDS☆59Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Updated 4 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆57Updated 6 years ago
- A curated list of malware-related papers.☆34Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 4 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Updated last year
- Code for our submission to IEEE CNS 2022☆24Updated 2 years ago
- PyTorch implements "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning"☆98Updated 6 months ago