☆13Feb 27, 2024Updated 2 years ago
Alternatives and similar repositories for FIWARE_SecurityTestbed
Users that are interested in FIWARE_SecurityTestbed are comparing it to the libraries listed below
Sorting:
- Policy Administration point to handle ODRL policies and provide their Rego-equivalent to the Open Policy Agent☆11Feb 23, 2026Updated last week
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- ☆15Jan 5, 2024Updated 2 years ago
- Example repository for Veramo NodeJS Tutorial☆12Jun 26, 2024Updated last year
- ☆11Oct 16, 2025Updated 4 months ago
- classroom exercises for 'Operating Systems' course☆10Jun 16, 2022Updated 3 years ago
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- Extension of P4 language tutorials☆12Nov 28, 2020Updated 5 years ago
- ☆15Jan 11, 2024Updated 2 years ago
- Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 202…☆13Nov 17, 2022Updated 3 years ago
- Java General Evolutionary Algorithm (jgea) is a modular Java framework for experimenting with Evolutionary Computation.☆24Feb 20, 2026Updated last week
- Examples about Docker☆20May 29, 2025Updated 9 months ago
- 🎉LLaMA Demo 7B🎉☆17Mar 23, 2023Updated 2 years ago
- Simple P4Runtime controller demonstrating the packet-in/packet-out functionality☆15Jun 13, 2022Updated 3 years ago
- OpenTera - Open TeleRehabilitation Server and Micro-Services☆22Feb 18, 2026Updated last week
- This repository contains my notes for the University of Bologna's Autonomous and Adaptive Systems course, held by prof. Mirco Musolesi.☆25Jul 6, 2022Updated 3 years ago
- The Credential Profile Matrix and its documentation☆22Apr 1, 2023Updated 2 years ago
- 🦀🦊 Snappy (Firefox morgue cache format) files de-compressor, works even if they're corrupted☆30Apr 29, 2025Updated 10 months ago
- A 2-4h workshop on the Tamarin protocol verifier.☆22Jun 12, 2025Updated 8 months ago
- A chrestomathy of smart contracts in different smart contract languages☆29Jan 4, 2026Updated last month
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆27Dec 11, 2023Updated 2 years ago
- Open vSwitch☆25Jan 31, 2025Updated last year
- The objective of this SIG is to develop and maintain the Digital Wallets and Agents Overview. The overview should provide transparency of…☆28Updated this week
- Are you bored of re-writing code for each plot? Create publication-quality plots with a simple interface over matplotlib.☆30Oct 16, 2025Updated 4 months ago
- ☆18Dec 31, 2022Updated 3 years ago
- An Ryu Application implemented NAT☆22Jun 22, 2017Updated 8 years ago
- In-network detection of network attacks using Random Forests and P4☆27Dec 22, 2023Updated 2 years ago
- Network Programming with Relational and Procedural Abstractions (NERPA)☆32Apr 4, 2023Updated 2 years ago
- ☆28Mar 13, 2022Updated 3 years ago
- High Performance Packet Timestamping with Programmable Packet Processors☆29Feb 17, 2026Updated last week
- ☆40Feb 17, 2026Updated last week
- A did-io driver for the DID "key" method☆32Sep 21, 2025Updated 5 months ago
- Python General Framework for Genetic Improvement [Version 2]☆30Nov 28, 2023Updated 2 years ago
- ☆44Updated this week
- An overview of SSI wallets☆34Oct 3, 2023Updated 2 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- This is a Tamarin model of TLS 1.3☆42Aug 19, 2023Updated 2 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- NS3 support for P4 programs using bmv2☆34Feb 20, 2019Updated 7 years ago