☆16Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for zero-day-detection
Users that are interested in zero-day-detection are comparing it to the libraries listed below
Sorting:
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆20Sep 9, 2025Updated 5 months ago
- ☆10Mar 7, 2023Updated 2 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆34Nov 10, 2022Updated 3 years ago
- An implementation of BERT for cybersecurity named entity recognition☆26Nov 13, 2020Updated 5 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated 10 months ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Aug 12, 2021Updated 4 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- zkSnark circuit compiler☆12Feb 19, 2026Updated last week
- ☆19Jul 1, 2023Updated 2 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- ☆14Apr 1, 2025Updated 11 months ago
- ☆12Sep 19, 2022Updated 3 years ago
- Enemies for your LLM☆35Jan 20, 2026Updated last month
- ☆11Aug 23, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- Marketing for all social platforms.☆11Jul 26, 2021Updated 4 years ago
- reddit's python experiments framework☆12Apr 28, 2025Updated 10 months ago
- ☆11Oct 28, 2023Updated 2 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Implementation of YOLO (You Only Look Once) computer Vision algorithm in a React UI, for the subject Intelligent Systems (ULL)☆10Jan 27, 2019Updated 7 years ago
- Repository containing the PhD Thesis "Formal Verification of Deep Reinforcement Learning Agents"☆11Aug 29, 2022Updated 3 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- ☆10May 26, 2024Updated last year
- This project aims at giving the best customer service ever using the power of LLM models like GPT.☆10Jun 29, 2023Updated 2 years ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- ☆11Mar 31, 2023Updated 2 years ago
- K&CG SATLLAZERO Open Source Project. Ariel University. 2023.☆14Jan 17, 2024Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆11Dec 16, 2021Updated 4 years ago