AlazzamHadeel / PIO
Feature Selection using Pigeon Inspired Optimizer for Intrusion Detection System
☆7Updated 2 years ago
Alternatives and similar repositories for PIO
Users that are interested in PIO are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 months ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆16Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 4 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆33Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆19Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Updated 4 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆14Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 3 years ago
- ☆41Updated 2 years ago
- Attention Model for Network Intrusion Detection☆17Updated 5 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆16Updated 2 years ago
- ☆9Updated last year
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆14Updated 2 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆12Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- ☆11Updated 2 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 5 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆13Updated 2 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆68Updated 4 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆22Updated 4 years ago
- ☆17Updated 4 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Updated 6 years ago