The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.
☆78Oct 11, 2021Updated 4 years ago
Alternatives and similar repositories for E-ResGAT
Users that are interested in E-ResGAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆54Nov 11, 2021Updated 4 years ago
- A PyTorch implementation of of E-GraphSAGE.☆107Jun 30, 2022Updated 3 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- NEGSC☆48May 30, 2024Updated last year
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Network System Intrusion Detection using Graph Neural Networks☆22Aug 1, 2023Updated 2 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆124Oct 25, 2022Updated 3 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- A Graph Neural Network-based Intrusion Detection System☆37Aug 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆20Jul 10, 2024Updated last year
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- ☆34Oct 14, 2023Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆99Aug 1, 2023Updated 2 years ago
- ☆10Jun 23, 2022Updated 3 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- ☆140Jun 17, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- ☆128May 3, 2023Updated 3 years ago
- ☆11Apr 7, 2026Updated 3 weeks ago
- ☆12Jan 26, 2019Updated 7 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆11Jan 2, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- This is the repository for the AAAI 21 paper [Contrastive and Generative Graph Convolutional Networks for Graph-based Semi-Supervised Lea…☆18Feb 28, 2023Updated 3 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆85Jan 13, 2022Updated 4 years ago