西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案
☆22Mar 30, 2021Updated 4 years ago
Alternatives and similar repositories for WestLakeSwordComp
Users that are interested in WestLakeSwordComp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- ☆11Nov 27, 2020Updated 5 years ago
- 本项目旨在设计和实现一个基于深度学习的加密恶意流量检测系统。通过将网络流量数据转换为图像数据,并利用图像分类模型进行检测,该系统能够有效地检测加密恶意流量。在数据集选取上使用了包含加密恶意和正常流量的数据集,以更好地反映实际网络环境中的特征和行为模式。在数据预处理方面,通过…☆14Feb 28, 2024Updated 2 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Mar 14, 2021Updated 5 years ago
- 对恶意流量分析的练习☆26Jan 25, 2022Updated 4 years ago
- DingTalkLiveDownload——钉钉直播回放下载器☆18Oct 17, 2024Updated last year
- 本科毕业设计-加密恶意流量检测☆24Jun 11, 2024Updated last year
- 使用机器学习的恶意加密流量识别系统☆51Jan 8, 2024Updated 2 years ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- 冰蝎3 流量 分析解密工具☆15Jan 8, 2022Updated 4 years ago
- 2023年第六届浙江省大学生网络与信息安全竞赛☆22Nov 17, 2023Updated 2 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- 结合日常使用为 Pcap4j 库编写的中文文档 ,包括教程、源码注释等,基于 Pcap4j-2.0.0-alpha.6☆27Jul 6, 2020Updated 5 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆118Nov 17, 2020Updated 5 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- BUPT SCSS大三小学期 机器学习分析恶意加密流量包项目☆66Sep 11, 2020Updated 5 years ago
- ☆20Jul 10, 2024Updated last year
- 爬取抖音号下所有视频以及视频描述信息等🤭☆12May 23, 2022Updated 3 years ago
- Repository for Federated Learning with Differential Privacy☆11May 28, 2022Updated 3 years ago
- ☆19Apr 14, 2025Updated 11 months ago
- java简单实现一些机器学习算法☆13Dec 10, 2020Updated 5 years ago
- All exercises from private AI Facebook Scholarship☆13Jul 21, 2019Updated 6 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- 中国科学信息科学latex模板。可以在texlive 2014 + texstudio下使用☆10Aug 2, 2015Updated 10 years ago
- Differentially Private Federated Learning: A Client Level Perspective☆12Jul 3, 2019Updated 6 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- 常用脚本☆28Nov 22, 2019Updated 6 years ago
- 威胁流量检测系统☆75Nov 19, 2019Updated 6 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- cool project☆20Jan 18, 2021Updated 5 years ago
- Extract network flow features from PCAP files for machine learning and network analysis☆92Nov 24, 2025Updated 3 months ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- 基于机器学习的恶意加密流量监测平台☆148May 16, 2021Updated 4 years ago
- privacy preserving deep learning☆15Sep 11, 2017Updated 8 years ago