MohdSaif-1807 / Network-Intrusion-Detection-System-Using-Machine-Learning-and-Deep-LearningView on GitHub
Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web I/O System. The deployed project link is as follows.
☆21Apr 29, 2024Updated last year
Alternatives and similar repositories for Network-Intrusion-Detection-System-Using-Machine-Learning-and-Deep-Learning
Users that are interested in Network-Intrusion-Detection-System-Using-Machine-Learning-and-Deep-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Netwo…☆20Feb 26, 2024Updated 2 years ago
- Fundamentals of Machine Learning with Scikit-Learn☆16Jan 14, 2021Updated 5 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- ☆30Nov 12, 2022Updated 3 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- 个人笔记☆18Apr 1, 2022Updated 3 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- A real-time human counter that uses HOG and SVM. Developed as project for the Computer Vision course at Sapienza University of Rome (2021…☆12Apr 2, 2022Updated 3 years ago
- Export the articles and reports from Google Scholar easily! (The spider structure is inspired by the Scrapy framework)☆12Nov 10, 2023Updated 2 years ago
- It's an end-to-end Machine Learning Project. The prediction has been done by using Machine Learning (ML) classification algorithms and it…☆11Nov 26, 2022Updated 3 years ago
- This project leverages YOLO (You Only Look Once) to detect various traffic violations in real-time, aimed at improving road safety and co…☆17Feb 12, 2025Updated last year
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Jan 13, 2022Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆78Apr 3, 2021Updated 4 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆147Oct 12, 2021Updated 4 years ago
- 漫画网站爬虫☆10Jan 9, 2025Updated last year
- This repository was a submission to Unscript hackthon 2022. Domain of AI/ML and Skin Type Recognition problem statement.☆11Jan 23, 2022Updated 4 years ago
- Car number plate recognition project using Deep Learning frameworks like Yolo, CNN, and CRNN models☆11Dec 8, 2022Updated 3 years ago
- image classification with VGG16+SVM and VGG-16☆11Jul 12, 2019Updated 6 years ago
- ☆13Oct 19, 2022Updated 3 years ago
- QR code visual cryptography pipeline☆14Jul 7, 2020Updated 5 years ago
- Classification of Images using Support Vector Machines and Feature Extraction using SIFT.☆14Nov 27, 2020Updated 5 years ago
- This project analyzes and predicts housing sale price based on features such as square footage, number of bedrooms, views, locations, etc…☆10Jul 27, 2019Updated 6 years ago
- 一个基于区块链的存储系统,可以在多个节点(设备)中,为用户生成非对称加密的公私钥对,并使用此密钥对,对数据进行加密上传,和解密下载。☆14Nov 16, 2022Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Real time traffic sign classification using deep learning☆13May 8, 2017Updated 8 years ago
- This repo contains my final year project on tea leaf diseases using deep learning as a partial fulfillment of my degree of master in scie…☆12Jul 23, 2023Updated 2 years ago
- This repo is about Vehicle Price Prediction using machine learning and web app created using flask server andalso deployed on heroku☆11Mar 20, 2021Updated 5 years ago
- This is my Master thesis which evaluates 6D pose estimating deep learning methods for usage in an AR use case. It includes 2 new proxies …☆17Feb 7, 2020Updated 6 years ago
- 一款预封装的CTF/渗透测试用虚拟机☆80Sep 15, 2025Updated 6 months ago