Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have the potentials to become a serious threat to the network.
☆30Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Traffic-Classification-UNSW-NB15
Users that are interested in Network-Traffic-Classification-UNSW-NB15 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆91Sep 19, 2020Updated 5 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆203Sep 8, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆80Apr 3, 2021Updated 5 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- A comparison of various dimensionality reduction techniques from scikit-learn. Including PCA, t-SNE, LLE, Hessian LLE, Modified LLE, Isom…☆14Nov 8, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- Open5GS 5GC & UERANSIM UE / RAN Sample Configuration - Select UPF based on S-NSSAI☆14Apr 1, 2024Updated 2 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- configure different congestion control algorithms☆10Jun 14, 2021Updated 4 years ago
- Daily EDN exports of ClojureDocs's database.☆10Dec 14, 2024Updated last year
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Delimited continuations library☆17Nov 8, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Enforce default values on structs in Go☆29Aug 15, 2022Updated 3 years ago
- Infrastructure needed to generate, build and install the PD library for a given P4 program☆13Jul 11, 2017Updated 8 years ago
- Java Class file parser and analyzer written in Clojure☆14Dec 2, 2019Updated 6 years ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆24Apr 9, 2024Updated 2 years ago
- The source code of NuevoMatch as described in "A Computational Approach to Packet Classification" (SIGCOMM, 2020)☆44Apr 5, 2021Updated 5 years ago
- A handy cli interface to searching and opening books from your calibre library or recently read titles from your library.☆10Jun 14, 2020Updated 5 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- ☆18Oct 11, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Example code for my SCTP related blog posts☆16Jul 15, 2022Updated 3 years ago
- pytorch ucc plugin☆23Jul 8, 2021Updated 4 years ago
- ☆10Jun 1, 2019Updated 6 years ago
- A Goldennum Game battleground.☆11Mar 6, 2023Updated 3 years ago
- This is an implementation of PartitionSort as described in "A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classifica…☆10Dec 6, 2016Updated 9 years ago
- SICP Online Judge, consisting of a server, a react web interface and a modified Ok client.☆12Dec 5, 2022Updated 3 years ago
- Supervised Learning approach to Detect Anomalies in Blockchain using Federated Learning☆34May 27, 2020Updated 5 years ago
- Rough Set Python Package is a Python library that provides a set of tools to calculate rough sets and obtain reduct rules.☆15Mar 30, 2024Updated 2 years ago
- Get a Voronoi diagram given some points☆16Jan 9, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Network Intrusion Detection using GNN☆28Feb 13, 2025Updated last year
- phlegyas: an implementation of 9P2000 in Clojure.☆15Jun 5, 2023Updated 2 years ago
- ☆11Sep 9, 2021Updated 4 years ago
- Searching for help in ClojureDocs.org☆14Nov 29, 2020Updated 5 years ago
- P4Runtime Controller Library☆13Updated this week
- Major refactor works ongoing☆14Jul 14, 2019Updated 6 years ago
- A project for understanding deployment of Clojure apps to the cloud.☆13Nov 11, 2019Updated 6 years ago