taerikkk / BPELinks
☆13Updated 3 years ago
Alternatives and similar repositories for BPE
Users that are interested in BPE are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- Passive DNS Dataset of Domain Resolutions☆18Updated 3 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Updated 10 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆71Updated 5 months ago
- Insider threat detection via bert☆20Updated 3 years ago
- ☆17Updated last year
- ☆18Updated last year
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆17Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 4 years ago
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- ☆10Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Updated 5 months ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆25Updated 9 months ago
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
- A tunneled flooding traffic detection system.☆26Updated 9 months ago
- Leveraging network topology for better fake account detection in social networks☆10Updated 2 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆11Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆72Updated 3 years ago
- ☆58Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆42Updated last year
- Official repository for AAAI'23 paper: Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinf…☆29Updated 2 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆29Updated 3 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Updated 2 years ago
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Updated 2 years ago
- Datasets used in the StreamSpot experiments☆61Updated 9 years ago