taerikkk / BPELinks
☆13Updated 3 years ago
Alternatives and similar repositories for BPE
Users that are interested in BPE are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
 - The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆17Updated 3 years ago
 - SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
 - Insider threat detection via bert☆22Updated 3 years ago
 - ☆19Updated last year
 - Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
 - AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Updated last year
 - [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Updated 2 years ago
 - Passive DNS Dataset of Domain Resolutions☆19Updated 3 years ago
 - Forest of random partitioning trees for point-wise and collective anomaly detection☆12Updated last year
 - ☆10Updated 2 years ago
 - Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
 - convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
 - 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
 - Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆25Updated 10 months ago
 - 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
 - The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
 - ☆17Updated last year
 - Leveraging network topology for better fake account detection in social networks☆10Updated 2 years ago
 - An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆22Updated 5 years ago
 - ☆10Updated 5 years ago
 - Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
 - Building an Intrusion detection system using KDD Cup 99 Dataset☆14Updated 5 years ago
 - The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆73Updated 4 years ago
 - Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆43Updated last year
 - Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 6 months ago
 - A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 4 years ago
 - ☆24Updated 3 years ago
 - Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆23Updated 4 years ago
 - ☆20Updated 4 years ago