Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.
☆11Mar 6, 2024Updated 2 years ago
Alternatives and similar repositories for cicIoT
Users that are interested in cicIoT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 2 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Implementation of RouteNet, an effective way for Network Modeling and Optimization in SDN☆18Mar 21, 2024Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- This repo contians a list of paper related to graph incremental learning☆14Sep 26, 2023Updated 2 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- ☆11May 1, 2021Updated 4 years ago
- Hybrid KNN and SVM based incremental learning for image classification☆25Jun 29, 2017Updated 8 years ago
- 📊 Source code for 'Query a Digital Music Store Database' project☆12Aug 29, 2018Updated 7 years ago
- IoT Attack Detection with machine learning☆31Jun 12, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆24Aug 9, 2022Updated 3 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Generalised and highly customisable, hybrid-parallelism, database based, deep learning framework.☆18May 2, 2020Updated 5 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Pair Trading Analysis & Exercises Toolkit [Jupyter Notebook]☆12Nov 3, 2023Updated 2 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- ☆25Jun 27, 2022Updated 3 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- PyTorch implementation of the ICML 2020 paper "Latent Bernoulli Autoencoder"☆25Apr 8, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆13Apr 22, 2021Updated 4 years ago
- Master of Data Science Project☆15Nov 26, 2024Updated last year
- A cross-platform 8086/8088 assembler & emulator built to make assembly easier.☆16Dec 20, 2025Updated 3 months ago
- Personal Portfolio Website Templates☆55May 25, 2023Updated 2 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆13Feb 25, 2024Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- Rope collision in cpp☆12Jun 2, 2025Updated 10 months ago
- ChatTube: A Retrieval QA System to Youtube Videos☆10Jun 6, 2023Updated 2 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Pytorch Implementation of the Explainable Conditional Adversarial Autoencoder using Saliency Maps and SHAP (J. of Imaging - MDPI)☆12Mar 5, 2025Updated last year
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago