This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
☆38Sep 11, 2020Updated 5 years ago
Alternatives and similar repositories for machine-learning-SIEM-water-infrastructure
Users that are interested in machine-learning-SIEM-water-infrastructure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- SCADA Simulator encompassing things from PLCs to devices such as valves, pumps, tanks, etc. and environmental properties such as water pH…☆16Jun 6, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆14Jul 10, 2024Updated last year
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- This is the OFFICIAL CybernetiX S3C website.☆21Feb 4, 2026Updated 3 months ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- ☆19Feb 22, 2022Updated 4 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- Snort rules☆11Oct 22, 2015Updated 10 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆33Oct 15, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A python to Siemens WinCC interface.☆34Sep 13, 2017Updated 8 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- A table view as custom web control for WinCC Unified☆17May 3, 2024Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆42Jun 15, 2020Updated 5 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆81Apr 3, 2021Updated 5 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆16Apr 29, 2024Updated 2 years ago
- ☆16Apr 20, 2024Updated 2 years ago
- ScadaPy Creator for modbus client☆14Sep 5, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11May 1, 2021Updated 5 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- ICS/SCADA nmap script.☆18May 17, 2018Updated 8 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- Masters of IT project, network attacks against Profinet SCADA systems.☆32Sep 15, 2016Updated 9 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆207Apr 20, 2026Updated last month
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- ☆18Aug 30, 2023Updated 2 years ago
- Discover and enumerate all PLC devices and applications via a snap☆13May 28, 2018Updated 7 years ago
- A Simple python script for detection Potential DDoS Attacks☆13Feb 6, 2023Updated 3 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆23May 10, 2024Updated 2 years ago
- Free extensions for WinCC OA >= 3.15☆16Jun 16, 2017Updated 8 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago