taerikkk / BPE
☆12Updated 2 years ago
Alternatives and similar repositories for BPE:
Users that are interested in BPE are comparing it to the libraries listed below
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆17Updated 4 years ago
- AAAI'25 Main Technical Track Paper: Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆13Updated last week
- ☆11Updated 3 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆14Updated 3 years ago
- Packet Representation Learning for Traffic Classification☆27Updated last month
- ☆11Updated 3 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated 5 months ago
- ☆15Updated 6 months ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 4 years ago
- Insider threat detection via bert☆18Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆63Updated last year
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- 布谷鸟异构图构建,对比学习☆10Updated 2 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 4 years ago
- ☆15Updated last year
- ☆17Updated 3 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- CIKM'23 Full/Long Paper: Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆18Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆9Updated last year
- Datasets used in the StreamSpot experiments☆54Updated 8 years ago
- ☆49Updated last year
- ☆19Updated 2 years ago
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆10Updated 2 weeks ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- NLP model and tech for cyber security tasks☆85Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆18Updated 3 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆22Updated 2 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- ☆11Updated 4 years ago