taerikkk / BPELinks
☆13Updated 3 years ago
Alternatives and similar repositories for BPE
Users that are interested in BPE are comparing it to the libraries listed below
Sorting:
- ☆14Updated 4 years ago
- Passive DNS Dataset of Domain Resolutions☆19Updated 3 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Updated 11 months ago
- ☆10Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 10 months ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Updated 3 years ago
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
- ☆20Updated last year
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Updated 2 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Updated last year
- ☆23Updated 6 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Updated last year
- ☆58Updated 2 years ago
- Insider threat detection via bert☆23Updated 4 years ago
- Implementation of TheWebConf 2021 -- Few-shot Network Anomaly Detection via Cross-network Meta-learning☆60Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Updated 4 years ago
- Leveraging network topology for better fake account detection in social networks☆10Updated 2 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆29Updated 4 years ago
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Updated 4 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 5 years ago
- ☆20Updated last year
- This repository is for reviewers to check the code of KDD2021 Dr.Droid☆19Updated 4 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 4 years ago
- ☆13Updated 3 years ago
- A tunneled flooding traffic detection system.☆30Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Updated 2 years ago
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Updated 9 months ago