FrauThes / DigitalTwin-SIEM-integrationLinks
☆18Updated 3 years ago
Alternatives and similar repositories for DigitalTwin-SIEM-integration
Users that are interested in DigitalTwin-SIEM-integration are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆48Updated 7 months ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆72Updated 2 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Updated 6 years ago
- ☆60Updated last year
- HIL-based Augmented ICS (HAI) Security Dataset☆161Updated 2 years ago
- A Framework for Generating and Executing Digital Twins☆64Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆26Updated 2 months ago
- Modbus Dataset from CSET 2016☆48Updated 2 years ago
- ICS Cybersecurity PCAP respository☆62Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆14Updated 3 years ago
- IoT-Flock is an open-source tool for IoT Traffic Generation which supports the two widely used IoT Application Layer Protocols, i.e., MQT…☆31Updated 5 years ago
- Journal Article: IEEE Access☆16Updated 2 years ago
- IoT Attack Detection with machine learning☆27Updated 6 months ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆14Updated 2 months ago
- Machine Learning in Cybersecurity☆88Updated 6 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆87Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆24Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26Updated 5 years ago
- A PyTorch implementation of of E-GraphSAGE.☆94Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆222Updated 5 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆65Updated 5 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆78Updated 6 months ago
- A PyTorch implementation of of Anomal-E.☆37Updated 2 years ago
- A research project of anomaly detection on dataset IoT-23☆105Updated last year
- ☆19Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆17Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆75Updated 4 years ago