☆21Jan 27, 2025Updated last year
Alternatives and similar repositories for MAGNETO
Users that are interested in MAGNETO are comparing it to the libraries listed below
Sorting:
- ☆24Aug 8, 2022Updated 3 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- ☆13Apr 6, 2023Updated 2 years ago
- ☆20Jul 10, 2024Updated last year
- ☆16Dec 29, 2022Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- Implementation of "Deep reinforcement learning for imbalanced classification" and its extended version to multi-class☆17Sep 30, 2021Updated 4 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- ☆12Jul 8, 2022Updated 3 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- A methodology to transform a non-image data to an image for convolution neural network architecture☆33Oct 9, 2025Updated 5 months ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- A transformer model to predict pathogenic mutations☆12Jun 25, 2025Updated 8 months ago
- A python implementation of the DeepInsight methodology.☆173Sep 30, 2025Updated 5 months ago
- ☆24Nov 9, 2020Updated 5 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- Data stream analytics: Implement online learning methods to address concept drift and model drift in dynamic data streams. Code for the p…☆34Jan 11, 2023Updated 3 years ago
- MVP (Qi et al 2021) source code☆17May 11, 2021Updated 4 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- ☆76Aug 31, 2025Updated 6 months ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- Adapter-X: A Novel General Parameter-Efficient Fine-Tuning Framework for Vision☆11Jul 22, 2024Updated last year
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆18Sep 21, 2020Updated 5 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- Phenotype prediction through genotype by means of GNNs☆13Oct 21, 2022Updated 3 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆27Sep 21, 2024Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- ☆14Apr 26, 2022Updated 3 years ago
- ☆11Dec 8, 2020Updated 5 years ago
- GAN_based_Intrusion_Detection_System_for_in-vehicle_network☆17Dec 3, 2024Updated last year