A framework for building provenance-based intrusion detection systems with neural networks
☆86Mar 21, 2026Updated this week
Alternatives and similar repositories for PIDSMaker
Users that are interested in PIDSMaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 7 months ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆135Oct 24, 2024Updated last year
- ☆32Jul 21, 2025Updated 8 months ago
- ☆106Aug 23, 2023Updated 2 years ago
- ☆125May 3, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆36Dec 6, 2024Updated last year
- ☆19Nov 27, 2023Updated 2 years ago
- ☆13Aug 18, 2025Updated 7 months ago
- ☆17Updated this week
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- ☆137Jun 17, 2020Updated 5 years ago
- UniGen: Enhanced Training & Test-Time Strategies for Unified Multimodal Understanding and Generation☆38Nov 24, 2025Updated 4 months ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Multi-scale Signed Recurrence Plot Based Time Series Classification Using Inception Architectural Networks☆10Jul 11, 2023Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- ☆58Nov 6, 2023Updated 2 years ago
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- ☆11May 3, 2019Updated 6 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆44Jan 25, 2026Updated 2 months ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- ☆86Feb 24, 2025Updated last year
- ☆11May 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Official repository for the paper Local Linear Attention: An Optimal Interpolation of Linear and Softmax Attention For Test-Time Regressi…☆23Oct 1, 2025Updated 5 months ago
- Internal utility libraries for Pkl☆16Mar 10, 2026Updated 2 weeks ago
- [NeurIPS'25] Backdoor Cleaning without External Guidance in MLLM Fine-tuning☆18Oct 13, 2025Updated 5 months ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- ☆31Jan 15, 2026Updated 2 months ago
- Replication code for Continuous Diffusion for Mixed-Type Tabular Data [ICLR 2025]☆12Aug 12, 2025Updated 7 months ago
- Simple and Ideal Circuit Simulation☆13Dec 4, 2017Updated 8 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆54Mar 16, 2026Updated last week
- The end of Screenshot 2023-12-20-21.11.59.png☆15Dec 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My PhD manuscript LaTeX code and the slides for the defense☆11Feb 2, 2022Updated 4 years ago
- ☆32Mar 13, 2026Updated 2 weeks ago
- 基于 CNN + LSTM 的网络流量检测☆23Mar 30, 2023Updated 2 years ago
- ☆18Feb 22, 2022Updated 4 years ago
- Rethinking the Trust Region in LLM Reinforcement Learning☆50Mar 2, 2026Updated 3 weeks ago
- ☆21Dec 3, 2025Updated 3 months ago
- ☆13Sep 22, 2022Updated 3 years ago