George730 / E-ResGATLinks
The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.
☆70Updated 3 years ago
Alternatives and similar repositories for E-ResGAT
Users that are interested in E-ResGAT are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of E-GraphSAGE.☆89Updated 3 years ago
- ☆47Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- NEGSC☆37Updated last year
- ☆20Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆14Updated last year
- ☆17Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆52Updated last year
- ☆12Updated 3 years ago
- ☆25Updated last year
- Network System Intrusion Detection using Graph Neural Networks☆17Updated 2 years ago
- ☆22Updated 3 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆35Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆20Updated 3 months ago
- ☆9Updated 2 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated 2 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆96Updated 7 months ago
- An Intrusion Detection System based on Deep Belief Networks☆84Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆113Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- ☆86Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆18Updated last year
- ☆44Updated 3 years ago
- ☆11Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- 基于动态图神经网络的异常流量检测方法☆46Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆44Updated last year