Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.
☆11Mar 6, 2024Updated 2 years ago
Alternatives and similar repositories for cicIoT
Users that are interested in cicIoT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Implementation of RouteNet, an effective way for Network Modeling and Optimization in SDN☆18Mar 21, 2024Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- This repo contians a list of paper related to graph incremental learning☆14Sep 26, 2023Updated 2 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆30Feb 22, 2024Updated 2 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- ☆11May 1, 2021Updated 4 years ago
- Hybrid KNN and SVM based incremental learning for image classification☆25Jun 29, 2017Updated 8 years ago
- IoT Attack Detection with machine learning☆30Jun 12, 2025Updated 9 months ago
- 📊 Source code for 'Query a Digital Music Store Database' project☆12Aug 29, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆24Aug 9, 2022Updated 3 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Generalised and highly customisable, hybrid-parallelism, database based, deep learning framework.☆18May 2, 2020Updated 5 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Pair Trading Analysis & Exercises Toolkit [Jupyter Notebook]☆12Nov 3, 2023Updated 2 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- ☆25Jun 27, 2022Updated 3 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- PyTorch implementation of the ICML 2020 paper "Latent Bernoulli Autoencoder"☆25Apr 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆12Apr 22, 2021Updated 4 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- Personal Portfolio Website Templates☆55May 25, 2023Updated 2 years ago
- Master of Data Science Project☆13Nov 26, 2024Updated last year
- A cross-platform 8086/8088 assembler & emulator built to make assembly easier.☆16Dec 20, 2025Updated 3 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆13Feb 25, 2024Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Rope collision in cpp☆12Jun 2, 2025Updated 9 months ago
- source code for USENIX Security paper xNIDS☆60Aug 27, 2024Updated last year
- ChatTube: A Retrieval QA System to Youtube Videos☆10Jun 6, 2023Updated 2 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Pytorch Implementation of the Explainable Conditional Adversarial Autoencoder using Saliency Maps and SHAP (J. of Imaging - MDPI)☆12Mar 5, 2025Updated last year
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago