taerikkk / BPELinks
☆13Updated 3 years ago
Alternatives and similar repositories for BPE
Users that are interested in BPE are comparing it to the libraries listed below
Sorting:
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- ☆13Updated 3 years ago
- Passive DNS Dataset of Domain Resolutions☆17Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- ☆18Updated last year
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆23Updated 8 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
- Leveraging network topology for better fake account detection in social networks☆10Updated 2 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- ☆16Updated last year
- ☆16Updated 2 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆11Updated 10 months ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆11Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆70Updated 4 months ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆20Updated 4 months ago
- Insider threat detection via bert☆20Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Updated 4 years ago
- Finding community structure in very large networks, by Clauset-Newman-Moore☆15Updated 7 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆23Updated 4 years ago
- ☆10Updated 5 years ago
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Updated 2 years ago
- ☆11Updated 3 years ago
- Source Code for Graph Anomaly Detection with Unsupervised GNNs (ICDM2022)☆12Updated 2 years ago
- A tunneled flooding traffic detection system.☆26Updated 9 months ago
- ☆57Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆42Updated last year