This version of SDN Switch Emulator is deprecated. Please find the new version in (https://github.com/arunmir/sdn-sim3)
☆14Oct 1, 2019Updated 6 years ago
Alternatives and similar repositories for sdn-sim
Users that are interested in sdn-sim are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- Smart-home network traffic ioT dataset☆18Nov 18, 2020Updated 5 years ago
- 为知笔记markdown转为hexo博客markdown,hexo博客markdown转外链图片的markdown(可直接复制到csdn、简书等)☆10Oct 29, 2019Updated 6 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- MQ-ECN NS2 Simulation☆11Feb 26, 2016Updated 10 years ago
- ☆14Nov 23, 2023Updated 2 years ago
- Reducing P4 Language’s Voluminosity using Higher-Level Constructs☆15Oct 15, 2022Updated 3 years ago
- Switch-based Training Acceleration for Machine Learning (SwitchML)☆16Apr 13, 2021Updated 4 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- Decentralized Intelligent Resource Allocation for LoRaWAN Networks☆17May 9, 2019Updated 6 years ago
- P4 DDoS 防御☆16Jul 28, 2023Updated 2 years ago
- Application Layer DDoS attack detection using fast entropy computation method☆13May 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- Research Advances in the Latest Federal Learning Papers (Updated March 27, 2023)☆14Sep 19, 2023Updated 2 years ago
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- ☆12May 6, 2020Updated 5 years ago
- P4 source code of FCM-Sketch☆18Feb 23, 2021Updated 5 years ago
- the re-implementation of MS-TCN with pytorch☆13Jun 12, 2020Updated 5 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- A P4 implementation of Elastic Sketch☆20May 16, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Sep 12, 2018Updated 7 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- Info package for students who are about to start working on their master thesis.☆26Mar 5, 2026Updated 3 weeks ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆29Nov 6, 2022Updated 3 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆14Apr 4, 2024Updated last year
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- The channel separation incremental learning algorithm for wireless device identification. With mathematical proofs of the accuracy of ort…☆18Dec 8, 2021Updated 4 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Practical SQL case studies answered in Postgresql flavour☆25Sep 26, 2022Updated 3 years ago