George730 / E-ResGATLinks
The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.
☆76Updated 4 years ago
Alternatives and similar repositories for E-ResGAT
Users that are interested in E-ResGAT are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of E-GraphSAGE.☆99Updated 3 years ago
- ☆53Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆38Updated 3 years ago
- NEGSC☆44Updated last year
- ☆22Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Updated last year
- ☆19Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- ☆14Updated 4 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- ☆31Updated 2 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆15Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆89Updated 3 years ago
- ☆24Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆119Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆38Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆61Updated last year
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Updated last year
- ☆10Updated last year
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆19Updated 2 years ago
- ☆10Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 4 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- ☆48Updated 3 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Updated 8 months ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆52Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆32Updated 3 years ago