☆23Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for INTRUSION-DETECTION-BIG-DATA
Users that are interested in INTRUSION-DETECTION-BIG-DATA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆30May 8, 2019Updated 6 years ago
- ☆23May 15, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 前端基于 Vue2.x+ElementUI实现页面布局,后端基于Node.js+Koa2实现接口封装,数据库基于MongoDB实现数据存储,实现一个简单的前后端分离的后台管理系统,涵盖字典管理、菜单管理、用户管理、日志管理、角色授权等基本功能,对于纯前端的开发者独立实现全栈…☆11Jun 7, 2022Updated 3 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Fast API Endpoint!. This project examines, analyses the malware statically & dynamically using conventional strategies and also apply mac…☆10Apr 10, 2023Updated 3 years ago
- This is a classification task based on CIFAR10,Accuracy is about 87%(without pre-training),The net is CoAtNet(0-5,total coatnet family),w…☆10Oct 1, 2023Updated 2 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- CSE-CIC-IDS-2018 analyze with Random Forest☆30Apr 4, 2021Updated 5 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- gulp plugin to convert html file to txt.☆10May 1, 2020Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆15Sep 18, 2023Updated 2 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆766May 8, 2019Updated 6 years ago
- The original Protocol-oblivious Forwarding (POF) switch by Huawei☆10Sep 1, 2016Updated 9 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have…☆30Dec 19, 2021Updated 4 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆90Jan 24, 2018Updated 8 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- ☆13May 5, 2023Updated 2 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- IDS abnormal traffic detection tensorflow☆44Jul 25, 2019Updated 6 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆175Dec 15, 2019Updated 6 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Implements rapidchain consensus algorithm☆10Jan 30, 2022Updated 4 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆10Jun 27, 2020Updated 5 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Intrusion detection system using CNN and RNN☆26Sep 23, 2019Updated 6 years ago
- ☆15Sep 21, 2020Updated 5 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year