IoT device type identification using machine learning techniques.
☆40Aug 18, 2018Updated 7 years ago
Alternatives and similar repositories for IoT-device-type-identification
Users that are interested in IoT-device-type-identification are comparing it to the libraries listed below
Sorting:
- A Behavior-Based Device Identification Method for the IoT☆58Feb 25, 2025Updated last year
- This program allow you to extract some features from pcap files.☆39Apr 4, 2023Updated 2 years ago
- ☆19Mar 29, 2022Updated 3 years ago
- ☆70Feb 10, 2023Updated 3 years ago
- signal denoising + modulation recognition☆10Aug 7, 2018Updated 7 years ago
- ☆15Jan 14, 2025Updated last year
- ☆17Mar 22, 2025Updated 11 months ago
- ☆31Mar 2, 2018Updated 8 years ago
- ☆14Jun 21, 2023Updated 2 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- Large AI model for wireless localization☆19Jun 18, 2025Updated 8 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆11May 6, 2021Updated 4 years ago
- ☆10Dec 3, 2023Updated 2 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A deep-learning framework for smartphone identification via passive traffic fingerprinting.☆11Feb 17, 2023Updated 3 years ago
- WiSR: Wireless Domain Generalization Based on Style Randomization☆11Nov 17, 2023Updated 2 years ago
- Public WiFi Dataset☆16Jan 23, 2024Updated 2 years ago
- python RobustRMC projects☆10Apr 22, 2024Updated last year
- Single-Source Domain Generalization for Bearing Fault Diagnosis Using Feature-Augmented Adaptive Neuro-Fuzzy Inference System☆11Apr 13, 2024Updated last year
- ☆11Sep 5, 2019Updated 6 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- ☆11Sep 12, 2021Updated 4 years ago
- Official source code for Time is Not Enough: Time-Frequency based Explanation for Time-Series Black-Box Models☆12Dec 5, 2024Updated last year
- ☆11Jun 1, 2023Updated 2 years ago
- Yali Zhang, Haifan Yin, Weidong Li, Emil Björnson, Mérouane Debbah, "Port-LLM: A Port Prediction Method for Fluid Antenna based on Large …☆15Sep 1, 2025Updated 6 months ago
- Radio Map Estimation (REM) with limited and quantized measurements.☆11Jul 21, 2025Updated 7 months ago
- ☆15Oct 16, 2024Updated last year
- An Open-Source Simulation Framework for WiFi-CSI-Based Multi-Robot Localization Systems. Code and setup files☆12Sep 9, 2024Updated last year
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- Ads.txt crawler and parser based on IAB Ads.txt Specification Version 1.0.1 implemented in Golang☆12Sep 4, 2019Updated 6 years ago
- An Open Dataset for Wireless Cellular Spectrum Monitoring and Anomaly Detection☆14Feb 8, 2026Updated last month
- An OMR approach for finding signature in PDF files☆10Jan 29, 2018Updated 8 years ago
- Public repository for the ICLR'23 paper "Few-shot domain adaptation for end-to-end communication"☆10Mar 4, 2023Updated 3 years ago
- Details of the datasets for Few-shot class-incremental audio classification☆11Dec 6, 2023Updated 2 years ago
- The Pytorch implementation of "RSCNet: Dynamic CSI Compression for Cloud-based WiFi Sensing"☆13Sep 25, 2024Updated last year
- ☆13Jan 31, 2024Updated 2 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 5 months ago