Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html
☆13Jan 20, 2020Updated 6 years ago
Alternatives and similar repositories for android_malware_classification
Users that are interested in android_malware_classification are comparing it to the libraries listed below
Sorting:
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 2 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- 《Redis 命令速查表》☆14Nov 6, 2017Updated 8 years ago
- ☆18Feb 2, 2023Updated 3 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 10 months ago
- [NeurIPS 2023 (Spotlight)] Uncovering the Hidden Dynamics of Video Self-supervised Learning under Distribution Shifts☆13Jan 30, 2024Updated 2 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆22Mar 30, 2021Updated 4 years ago
- android malware detection☆12Mar 16, 2016Updated 10 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- Android malware detection using static and dynamic analysis☆39Apr 16, 2019Updated 6 years ago
- ☆14Oct 24, 2024Updated last year
- ☆17Jul 25, 2024Updated last year
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆22Jun 10, 2023Updated 2 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- Teknolojide İstihdam Projesi kapsamında verdiğim uygulamalı doğal dil işleme dersinin kod ve sunumlarını burada barındıracağım.☆14Jun 2, 2023Updated 2 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- Prediction of wind turbine power generation from real-time SCADA data☆15May 22, 2022Updated 3 years ago
- ☆16Nov 16, 2023Updated 2 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated last year
- docker学习,参考b战 遇见狂神说☆14Apr 1, 2022Updated 3 years ago
- Android Malware Detection based on Deep Learning☆13Dec 8, 2017Updated 8 years ago
- docker websocket client for remote attch☆10Apr 23, 2015Updated 10 years ago
- This blog post visualize vector norms of FastText embedding and evaluates use of FastText word vector norm multiplied with number of word…☆19Jul 6, 2023Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆22May 24, 2025Updated 9 months ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆17Apr 26, 2021Updated 4 years ago
- Assignments for Stanford CS224n (Winter 2017)☆13Jan 31, 2018Updated 8 years ago
- Intrusion Detection Systems (IDS)☆11Aug 18, 2015Updated 10 years ago
- Repository for the lectures taught in the course named "Natural Language Processing" at the University of Guilan, Department of Computer …☆13Mar 31, 2023Updated 2 years ago
- Starter code and examples for getting started with network analysis using the NetworkX Python library.☆20May 4, 2022Updated 3 years ago
- dataSet for kubAnomaly model☆19Mar 24, 2023Updated 2 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker☆24Dec 8, 2022Updated 3 years ago