GintsEngelen / WTMC2021-CodeLinks
Code for our submission to the WTMC 2021 workshop
☆11Updated 3 years ago
Alternatives and similar repositories for WTMC2021-Code
Users that are interested in WTMC2021-Code are comparing it to the libraries listed below
Sorting:
- Code for our submission to IEEE CNS 2022☆18Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated last year
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆33Updated 5 years ago
- ☆19Updated 3 years ago
- ☆24Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆84Updated last year
- ☆18Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- IoT Attack Detection with machine learning☆27Updated 2 weeks ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆33Updated 4 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 5 years ago
- Synthesis of Adversarial DDos Attacks Using Tabular Generative Adversarial Networks☆10Updated 2 years ago
- ☆24Updated last year
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 5 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 9 months ago
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- Journal Article: Telematics and Informatics Reports☆12Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 10 months ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆13Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆35Updated 4 years ago
- Anomaly Detection using PCA and BiGAN☆13Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- ☆42Updated 2 years ago
- ☆67Updated last week
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- Deep learning models for network intrusion detection☆37Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 9 months ago