☆23Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for INTRUSION-DETECTION-BIG-DATA
Users that are interested in INTRUSION-DETECTION-BIG-DATA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆30May 8, 2019Updated 6 years ago
- ☆23May 15, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- Industrial Control Systems Network Intrusion Detection☆13Mar 19, 2021Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆761May 8, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The original Protocol-oblivious Forwarding (POF) switch by Huawei☆10Sep 1, 2016Updated 9 years ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have…☆30Dec 19, 2021Updated 4 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- ☆16Jul 15, 2022Updated 3 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- 基于区块链的数字证书系统☆11Jun 17, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- e-Health Record management system using Blockchain and IPFS☆11Sep 13, 2020Updated 5 years ago
- ☆13May 5, 2023Updated 2 years ago
- 基于最新版本的thinkphp6.0以上底层编写的一整套纯净版后台,拥有前后端分离器,内置一键快速CURD命令,kbuilder快速构建器[一个方法增删改查],插件管理模块,高级视觉扁平化后台界面[独一的风格]☆14Oct 10, 2020Updated 5 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- IDS abnormal traffic detection tensorflow☆44Jul 25, 2019Updated 6 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Feb 18, 2021Updated 5 years ago
- Intrusion detection system using CNN and RNN☆25Sep 23, 2019Updated 6 years ago
- ☆15Sep 21, 2020Updated 5 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- 深度学习500问,以问答形式对常用的概率知识、线性代数、机器学习、深度学习、计算机视觉等热点问题进行阐述,以帮助自己及有需要的读者。 全书分为18个章节,50余万字。由于水平有限,书中不妥之处恳请广大读者批评指正。 未完待续............ 如有意合作,联系sc…☆12Jan 21, 2020Updated 6 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- ☆10Mar 11, 2023Updated 3 years ago