Code for our submission to IEEE CNS 2022
☆24Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for CNS2022_Code
Users that are interested in CNS2022_Code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- CICFlowmeter written in python for easy to try out☆83Mar 30, 2026Updated last week
- ☆11Feb 14, 2023Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆197Sep 3, 2023Updated 2 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Mar 27, 2026Updated 2 weeks ago
- 自习室预约小程序就是用户在使用小程序在线订场服务,在小程序中,可以直观的看到自习室的预约情况、预约费用,然后在线缴付订金。还可以邀请小伙伴一起组队,只需要几分钟就能完成整个预约过程。有了自习室小程序,要查看附近有哪些自习室,直接在微信打开附近的小程序,周边自习室一览无遗;想…☆15Sep 29, 2022Updated 3 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆56Sep 6, 2023Updated 2 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆13May 15, 2022Updated 3 years ago
- 自学时写的适合Java安全小白用来学习Java反序列化漏洞的文章和Demo。(随懒狗的学习进度持续更新🐶)。Some articles and demos written during self-study which are suitable for Java Secu…☆12Dec 22, 2021Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆682Dec 4, 2023Updated 2 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- ☆34Oct 10, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆31Mar 2, 2018Updated 8 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Sep 30, 2023Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- A simple, cross-platform utility to classify packets into flows using only the essential 4-tuple.☆177Aug 12, 2025Updated 7 months ago
- ☆13Nov 7, 2025Updated 5 months ago
- this_my_ctf☆18Nov 17, 2021Updated 4 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆200Apr 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AWD 文件监控☆29Sep 14, 2023Updated 2 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆118Oct 19, 2023Updated 2 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆21Aug 9, 2023Updated 2 years ago
- Using ML techniques to detect and characterize DDoS traffic using the CIC_DDoS2019 dataset☆25Aug 27, 2022Updated 3 years ago
- 书籍、课程和文章汇总☆12Dec 14, 2022Updated 3 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago