FrauThes / DigitalTwin-SIEM-integrationLinks
☆18Updated 3 years ago
Alternatives and similar repositories for DigitalTwin-SIEM-integration
Users that are interested in DigitalTwin-SIEM-integration are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆46Updated 5 months ago
- ☆55Updated last year
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆71Updated 2 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆19Updated 6 years ago
- A research project of anomaly detection on dataset IoT-23☆100Updated last year
- Modbus Dataset from CSET 2016☆48Updated 2 years ago
- ICS Cybersecurity PCAP respository☆58Updated 6 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated last year
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆27Updated 2 months ago
- A PyTorch implementation of of E-GraphSAGE.☆90Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆187Updated 2 years ago
- A Framework for Generating and Executing Digital Twins☆62Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- SCADA network attack datasets and process logs☆20Updated 8 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆177Updated 4 years ago
- HIL-based Augmented ICS (HAI) Security Dataset☆156Updated 2 years ago
- The Westermo network traffic dataset☆23Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated last year
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 5 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆88Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆187Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆43Updated 6 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆141Updated 3 years ago
- ☆88Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26Updated 5 years ago