Hashehri / Network-Traffic-Classification-UNSW-NB15View external linksLinks
Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have the potentials to become a serious threat to the network.
☆28Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Traffic-Classification-UNSW-NB15
Users that are interested in Network-Traffic-Classification-UNSW-NB15 are comparing it to the libraries listed below
Sorting:
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆191Sep 8, 2021Updated 4 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- ☆15Jun 28, 2023Updated 2 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- This is an implementation of PartitionSort as described in "A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classifica…☆10Dec 6, 2016Updated 9 years ago
- Daily EDN exports of ClojureDocs's database.☆10Dec 14, 2024Updated last year
- A handy cli interface to searching and opening books from your calibre library or recently read titles from your library.☆10Jun 14, 2020Updated 5 years ago
- Delimited continuations library☆17Nov 8, 2014Updated 11 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆12Jan 7, 2025Updated last year
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆15Feb 1, 2026Updated 2 weeks ago
- Infrastructure needed to generate, build and install the PD library for a given P4 program☆13Jul 11, 2017Updated 8 years ago
- A cheap and easy to build digital Theremin☆10Jan 29, 2026Updated 2 weeks ago
- ☆46Updated this week
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- The source code of NuevoMatch as described in "A Computational Approach to Packet Classification" (SIGCOMM, 2020)☆44Apr 5, 2021Updated 4 years ago
- TLA+ modules to model message-passing with different guarantees (reliable, duplicating, out-of-order, at-least-once), and create visualiz…☆10Apr 20, 2021Updated 4 years ago
- This is a CNN model for prediction of cyber attack, trained using NSL-KDD dataset☆10Mar 7, 2024Updated last year
- My Solution to Assignments of CS234(Stanford / Fall 2019)☆15Sep 3, 2020Updated 5 years ago
- ☆13Dec 6, 2020Updated 5 years ago
- P4Runtime Controller Library☆13Nov 20, 2025Updated 2 months ago
- Data Visualization with Python☆10Nov 28, 2021Updated 4 years ago
- Open5GS 5GC & UERANSIM UE / RAN Sample Configuration - Select UPF based on S-NSSAI☆13Apr 1, 2024Updated last year
- Embed IPython to rescue your code.☆10Jul 11, 2025Updated 7 months ago
- C++ Template Manipulation Library☆33Dec 17, 2014Updated 11 years ago
- Java Class file parser and analyzer written in Clojure☆14Dec 2, 2019Updated 6 years ago
- CTF-Writeups☆11Mar 3, 2021Updated 4 years ago
- C++ Solutions for "Coding Interview Questions by Narasimha Karamanchi" 1st edition☆12Oct 1, 2020Updated 5 years ago
- Ideas for P4 Projects.☆14Sep 18, 2024Updated last year
- Writeup for the challenges in Really Awesome CTF 2020☆13Aug 3, 2020Updated 5 years ago
- PEG library for the Go language☆68Nov 14, 2016Updated 9 years ago
- SICP Online Judge, consisting of a server, a react web interface and a modified Ok client.☆12Dec 5, 2022Updated 3 years ago
- ☆17Jan 4, 2026Updated last month
- A mail library for Clojure.☆21Mar 6, 2013Updated 12 years ago
- 基于 Google Scholar 的论文他引次数统计。☆13Dec 8, 2022Updated 3 years ago
- A generational genetic algorithm approach to Java Virtual Machine settings optimization for a variety of servers.☆21Aug 29, 2014Updated 11 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- a clojure raft implementation☆21Jul 13, 2014Updated 11 years ago
- An example implementation of my algorithm for finding Strongly Connected Components.☆12Nov 19, 2019Updated 6 years ago