This project is created to show how machine learning can be used to detect anomalies in network traffic.
☆55Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for Network-Anomaly-Detection
Users that are interested in Network-Anomaly-Detection are comparing it to the libraries listed below
Sorting:
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆237Nov 16, 2022Updated 3 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 6 years ago
- This project aims to detect the anomalies in Web-Traffic using a C-LSTM architecture.☆26May 25, 2020Updated 5 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆51Mar 12, 2026Updated last week
- 采用VAE模型实现网络流量异常检测,并结合联邦学习与蒸馏学习☆16Dec 1, 2023Updated 2 years ago
- Classifying network traffic using machine learning approach☆24Jul 5, 2020Updated 5 years ago
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆17Jan 30, 2019Updated 7 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- An automated smart contract vulnerability repair tool☆12Aug 15, 2023Updated 2 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- The CLI version of MEGAJS☆12Apr 16, 2024Updated last year
- script to analyse data traffic on the Helium network by accessing the blockchain API☆17Aug 31, 2022Updated 3 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- A simple Kodi add-on which wraps 'NOW TV Player' to integrate with Kodi.☆13Jan 5, 2024Updated 2 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- ☆10May 24, 2021Updated 4 years ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- Definition and Detection of Defects in NFT Smart Contracts☆28Aug 31, 2025Updated 6 months ago
- A comprehensive set of colab notebooks to showcase the principal differences among XAI techniques☆12Aug 4, 2025Updated 7 months ago
- ☆11Mar 13, 2021Updated 5 years ago
- map protocol contracts.☆32Jan 30, 2025Updated last year
- ☆24Mar 11, 2022Updated 4 years ago
- ☆15Feb 27, 2021Updated 5 years ago
- Faithful Python implementation of the paper "Towards Deep Symbolic Reinforcement Learning" by Garnelo et al.☆13Mar 23, 2021Updated 4 years ago
- repo for the paper titled “CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation”☆14Oct 4, 2023Updated 2 years ago
- ☆14Feb 12, 2021Updated 5 years ago
- From Symbolic Logic Reasoning to Soft Reasoning: A Neural-Symbolic Paradigm☆12Jul 18, 2022Updated 3 years ago
- ☆16Jan 27, 2026Updated last month
- A graph data model of the human skeleton☆32Oct 6, 2021Updated 4 years ago
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆29Nov 6, 2022Updated 3 years ago
- A neurosymbolic T5 agent for playing text games, from the EACL 2023 paper "Behavior Cloned Transformers are Neurosymbolic Reasoners"☆20Feb 25, 2023Updated 3 years ago
- Code for 3D object detection for autonomous driving☆14Jan 17, 2020Updated 6 years ago
- From pixels to symbolic rule learning☆12Nov 12, 2021Updated 4 years ago
- 基于stm32f103c8t6的扫地机器人☆36Nov 29, 2019Updated 6 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆32Aug 28, 2022Updated 3 years ago