☆16Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for zero-day-detection
Users that are interested in zero-day-detection are comparing it to the libraries listed below
Sorting:
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆34Nov 10, 2022Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated 11 months ago
- Malware analysis using Naive Bayes ML classfier☆11Sep 9, 2019Updated 6 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- This is the first part of a TDOA-system used for estimating the time differences.☆17Feb 18, 2015Updated 11 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- zkSnark circuit compiler☆12Feb 19, 2026Updated last month
- A Formal Verification of Algorithm W☆17Mar 10, 2021Updated 5 years ago
- Fast subset and superset queries based on tries.☆11Jun 21, 2023Updated 2 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Quality Metrics for evaluating the inter-cluster reliability of Multidimensional Projections☆26Apr 30, 2023Updated 2 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 4 months ago
- ☆10Mar 11, 2023Updated 3 years ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- Version 2 of ZKaggle, 🏆 Finalist of ETHGlobal FVM Space Warp Hack☆16Jul 12, 2023Updated 2 years ago
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 2 years ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- A Lean 4 package for heavy numerical computations☆20Jan 16, 2022Updated 4 years ago
- Fast embedding-based graph classification with connections to kernels☆13May 6, 2020Updated 5 years ago
- coq-tutorial☆17Nov 11, 2019Updated 6 years ago
- ☆13Sep 23, 2024Updated last year
- ☆10Nov 13, 2025Updated 4 months ago
- Class Balancing GAN with a Classifier In The Loop (UAI 2021)☆12Feb 11, 2022Updated 4 years ago
- ☆10May 26, 2024Updated last year