MosabHamdan12 / nomaly-based-Intrusion-Detection-Technique-for-IoT-Enabled-Smart-CitiesView on GitHub
This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted for IoT-smart city networks, the upper layer network uses a gradient boosting classifier while the lower layer network employs deep learning (DL) based on the combination of a long-short-term memory and a convol…
☆14Dec 11, 2022Updated 3 years ago
Alternatives and similar repositories for nomaly-based-Intrusion-Detection-Technique-for-IoT-Enabled-Smart-Cities
Users that are interested in nomaly-based-Intrusion-Detection-Technique-for-IoT-Enabled-Smart-Cities are comparing it to the libraries listed below
Sorting:
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Dec 27, 2023Updated 2 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆198Apr 21, 2023Updated 2 years ago
- ☆11Nov 26, 2019Updated 6 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆19May 10, 2023Updated 2 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Journal Article: IEEE Access☆18Oct 23, 2023Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 4 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆195Sep 8, 2021Updated 4 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Jul 15, 2023Updated 2 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Code for the case study presented in "Making a Case for Federated Learning in the Internet of Vehicles and Intelligent Transportation Sys…☆27Apr 9, 2021Updated 4 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- This project optimizes EV charging station placement and capacity using MATLAB. It calculates optimal locations based on voltage stabilit…☆16Oct 10, 2024Updated last year
- A multi-task learning method for multi-energy load forecasting based on synthesis correlation analysis and load participation factor☆13Aug 18, 2023Updated 2 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- Short-Term Probabilistic Load Forecasting at Low Aggregation Levels Using Convolutional Neural Networks☆10Sep 19, 2019Updated 6 years ago
- Emergency Vehicle Smart Grid to provide faster movement to emergency vehicles.☆11Dec 12, 2019Updated 6 years ago
- Source code for the paper titled: "Unlocking the full potential of smart charging: Addressing paused and delayed charging problems in ele…☆11May 22, 2024Updated last year
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Scheduling Strategy of Electric Vehicle Charging Considering Different Requirements of Power Grid and Users☆10Apr 16, 2021Updated 4 years ago