JiweiTian / AnomalyDetectionLinks
A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the earliest possible detection of GPS spoofing attacks on UAV’s.
☆13Updated 5 years ago
Alternatives and similar repositories for AnomalyDetection
Users that are interested in AnomalyDetection are comparing it to the libraries listed below
Sorting:
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23Updated 3 years ago
- Journal Article: IEEE Access☆14Updated last year
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Updated 4 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆180Updated 2 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆13Updated 2 years ago
- Computers & Security☆17Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆88Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 5 years ago
- FL-based intrusion detection system development using model averaging.☆39Updated 2 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆12Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆86Updated 2 years ago
- harshilpatel1799 / IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-LearningThe continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆53Updated 4 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆35Updated 5 years ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆39Updated 5 months ago
- Journal Article: Telematics and Informatics Reports☆11Updated 2 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆70Updated 2 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆41Updated last year
- ☆15Updated 7 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆11Updated 6 months ago
- ☆45Updated 3 years ago
- Deep learning models for network intrusion detection☆39Updated 2 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆34Updated 5 years ago
- source code for USENIX Security paper xNIDS☆46Updated last year
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆46Updated 11 months ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆47Updated last year