tudelft-cda-lab / FlexFringe
The FlexFringe tool for flexible learning of state machines (deterministic automata) from traces. See the paper at https://arxiv.org/abs/2203.16331
☆16Updated this week
Related projects ⓘ
Alternatives and complementary repositories for FlexFringe
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- ☆30Updated 3 years ago
- Attack graph construction and analysis☆34Updated 5 years ago
- ☆14Updated 3 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Updated 8 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 6 months ago
- ☆18Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆20Updated last year
- A logic-based enterprise network security analyzer☆108Updated last year
- Material from the DARPA Transparent Computing Program☆179Updated 4 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- ☆30Updated 4 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆36Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- A deep learning-based vulnerability detection framework☆74Updated 8 months ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆14Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- This is a paper list about Machine Learning for IDSes☆86Updated 2 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆13Updated 5 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- ☆88Updated 2 weeks ago
- Cyber Code Intelligence (CyberCI)☆14Updated 3 years ago
- ☆41Updated 5 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated last year
- ☆17Updated 6 months ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆36Updated 6 years ago