☆20Dec 11, 2019Updated 6 years ago
Alternatives and similar repositories for NSL-KDD-DataSet
Users that are interested in NSL-KDD-DataSet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Work in progress about activity recognition/prediction using wearable sensors information☆16Sep 18, 2020Updated 5 years ago
- ☆20Jan 26, 2025Updated last year
- An Open Dataset for Wireless Cellular Spectrum Monitoring and Anomaly Detection☆16Mar 16, 2026Updated last month
- ☆14Jun 19, 2024Updated last year
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆16Feb 2, 2025Updated last year
- Computational Public Opinion Research☆13Jan 25, 2024Updated 2 years ago
- Windows running repository of the pix2surf code of the paper "Learning to Transfer Texture from Clothing Images to 3D Humans"☆19Jun 12, 2020Updated 5 years ago
- A Graph Neural Network-based Intrusion Detection System☆37Aug 12, 2024Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- K Nearest Neighbors classifier from scratch for image classification using MNIST Data Set.☆10Sep 14, 2018Updated 7 years ago
- ☆16May 9, 2022Updated 3 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆16Jan 16, 2023Updated 3 years ago
- Few-Shot Specific Emitter Identification (FS-SEI) Method☆24Oct 20, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 在线迁移学习算法实现☆24Mar 11, 2019Updated 7 years ago
- The channel separation incremental learning algorithm for wireless device identification. With mathematical proofs of the accuracy of ort…☆18Dec 8, 2021Updated 4 years ago
- [TNNLS 2024] Improving Semi-supervised Anomaly Detection with Pseudo-anomaly Generation☆19Jul 2, 2024Updated last year
- Online Learning code: TG -> FOBOS -> RDA ->FTRL ->FTPRL -> FTML☆26Nov 14, 2018Updated 7 years ago
- Mixed CNN and Transformer for Radio Frequency Fingerprint Recognition☆27Jul 31, 2024Updated last year
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆31Aug 2, 2023Updated 2 years ago
- Code for "Active One-shot Learning"☆33Mar 2, 2019Updated 7 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Mar 24, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆28Dec 5, 2023Updated 2 years ago
- 武汉大学网络安全学院操作系统实践wiki☆19Nov 18, 2021Updated 4 years ago
- This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.☆30Nov 4, 2021Updated 4 years ago
- Industrial Cybersecurity Second Edition, published by Packt☆35Jan 30, 2023Updated 3 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- ☆43Jun 26, 2023Updated 2 years ago
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆44Nov 23, 2023Updated 2 years ago
- Basic Machine learning projects and assignments done by me.☆34Aug 12, 2020Updated 5 years ago
- ☆41Jul 30, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of a hybrid PSO-GA algorithm☆30Nov 3, 2014Updated 11 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- Graph based Knowledge Distillation: A Survey☆69Apr 26, 2023Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 9 months ago
- ☆43Mar 6, 2023Updated 3 years ago
- CNN网络入侵检测☆58Apr 12, 2024Updated 2 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆47Apr 13, 2023Updated 3 years ago