JiweiTian / AnomalyDetectionLinks
A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the earliest possible detection of GPS spoofing attacks on UAV’s.
☆13Updated 5 years ago
Alternatives and similar repositories for AnomalyDetection
Users that are interested in AnomalyDetection are comparing it to the libraries listed below
Sorting:
- Journal Article: IEEE Access☆15Updated 2 years ago
- An intelligent classifier based Intrusion Detection System for IoV’s based on Neural Networks like optimized CNN, transfer learning and e…☆18Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆190Updated 2 years ago
- FL-based intrusion detection system development using model averaging.☆40Updated 2 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆41Updated last year
- ☆21Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆72Updated 2 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆30Updated 2 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23Updated 3 years ago
- experimental realization for Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicle in python☆13Updated 4 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Updated 4 years ago
- harshilpatel1799 / IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-LearningThe continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆56Updated 4 years ago
- LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection (arXiv:2311.08000v2)☆23Updated 9 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 5 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆47Updated 2 years ago
- A research project of anomaly detection on dataset IoT-23☆101Updated last year
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆13Updated 2 years ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆41Updated 7 months ago
- Code for the paper "Detecting In-vehicle Intrusion via Semi-supervised Learning-based Convolutional Adversarial Autoencoders"☆43Updated 3 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆35Updated 6 months ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆12Updated 3 years ago
- GNSS/GPS Spoofing Detection☆28Updated 3 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆15Updated 8 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- Created Network Intrusion Detection System using Pytorch☆14Updated 5 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Updated 6 years ago
- source code for USENIX Security paper xNIDS☆55Updated last year