A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".
☆38May 5, 2017Updated 8 years ago
Alternatives and similar repositories for ITKST42-network-data-classifier
Users that are interested in ITKST42-network-data-classifier are comparing it to the libraries listed below
Sorting:
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 7 years ago
- clean data ,feature selection , svm based kdd99☆26Oct 18, 2019Updated 6 years ago
- Python implementation of anomaly detection using the multivariate gaussian distribution☆12Sep 18, 2017Updated 8 years ago
- Operating System for your EON Gold☆13Dec 19, 2018Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 10 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- ☆18Nov 19, 2025Updated 3 months ago
- This is the code for paper "AIHO: Enhancing Task Offloading and Reducing Latency in Serverless Multi-Edge-to-Cloud Systems".☆12Feb 3, 2024Updated 2 years ago
- Code and data for Veridicality classifier on Twitter☆11May 23, 2018Updated 7 years ago
- ☆12Aug 9, 2016Updated 9 years ago
- Neo4j graphviz visualization☆12Apr 27, 2011Updated 14 years ago
- ☆11Jun 19, 2018Updated 7 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆41Sep 27, 2018Updated 7 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Optimization results for superconducting electronic (SCE) circuits☆18Dec 5, 2023Updated 2 years ago
- g729 codec from: http://g729.googlecode.com/svn/trunk/☆10Nov 13, 2014Updated 11 years ago
- ☆12Aug 10, 2017Updated 8 years ago
- MailHunter is a tool to give you access to the exchange server mails.☆12Apr 16, 2021Updated 4 years ago
- An R package implementing the NetEMD and NetDis network comparison measures☆14Jun 9, 2022Updated 3 years ago
- ☆11Aug 20, 2023Updated 2 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- mapmaking in R; building on work of others [with due credit given]☆10Aug 12, 2025Updated 6 months ago
- ☆12Jun 8, 2017Updated 8 years ago
- MXNet finetune baseline (res152) for challenger.ai/competition/scene☆11Sep 24, 2017Updated 8 years ago
- Semi-supervised Multi-view Variational Autoencoder (semiMVAE)☆11Sep 28, 2017Updated 8 years ago
- Domain Adaptations for Video Recognition☆13Dec 10, 2013Updated 12 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- Master Computer Vision™ OpenCV3 in Python and Machine Learning, published by Packt☆11Jan 15, 2021Updated 5 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago