Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have the potentials to become a serious threat to the network.
☆30Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Traffic-Classification-UNSW-NB15
Users that are interested in Network-Traffic-Classification-UNSW-NB15 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆200Sep 8, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆79Apr 3, 2021Updated 4 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- helper functions for processing and integrating visual language information with Qwen-VL Series Model☆17Aug 30, 2024Updated last year
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- This is a small project for interpreting PDF by using GPT☆19May 6, 2023Updated 2 years ago
- configure different congestion control algorithms☆10Jun 14, 2021Updated 4 years ago
- Daily EDN exports of ClojureDocs's database.☆10Dec 14, 2024Updated last year
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- A C++ implementation of quadtree☆17Jun 16, 2016Updated 9 years ago
- ☆17Feb 5, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CopyNet (Copy Mechanism in Seq2Seq) implementation with TensorFlow 2☆10Nov 21, 2022Updated 3 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Delimited continuations library☆17Nov 8, 2014Updated 11 years ago
- Infrastructure needed to generate, build and install the PD library for a given P4 program☆13Jul 11, 2017Updated 8 years ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆23Apr 9, 2024Updated last year
- A handy cli interface to searching and opening books from your calibre library or recently read titles from your library.☆10Jun 14, 2020Updated 5 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- ☆18Oct 11, 2024Updated last year
- Example code for my SCTP related blog posts☆16Jul 15, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Example code demonstrating ecdh key agreement using openssl evp library.☆11Feb 20, 2018Updated 8 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- This is an implementation of PartitionSort as described in "A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classifica…☆10Dec 6, 2016Updated 9 years ago
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- phlegyas: an implementation of 9P2000 in Clojure.☆15Jun 5, 2023Updated 2 years ago
- ☆11Sep 9, 2021Updated 4 years ago
- Searching for help in ClojureDocs.org☆14Nov 29, 2020Updated 5 years ago
- P4Runtime Controller Library☆13Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Claude Code Cloak — 保护本地设备隐私,安全使用 Claude Code☆101Mar 23, 2026Updated last week
- A project for understanding deployment of Clojure apps to the cloud.☆13Nov 11, 2019Updated 6 years ago
- BiLSTM-CNN for Chinese text classification.☆20Jan 26, 2021Updated 5 years ago
- a clojure raft implementation☆21Jul 13, 2014Updated 11 years ago
- Portfolio v3. using Steam template by Tom is Loading☆13Jan 30, 2024Updated 2 years ago
- T5 Fine-tuning on SQuAD Dataset for Question Generation☆12Feb 16, 2023Updated 3 years ago
- Bounce is a protocol-less, function composition-based alternative to Component☆17Sep 2, 2019Updated 6 years ago