☆23Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for INTRUSION-DETECTION-BIG-DATA
Users that are interested in INTRUSION-DETECTION-BIG-DATA are comparing it to the libraries listed below
Sorting:
- Based on the CICIDS2017 dataset and Pytorch platform☆29May 8, 2019Updated 6 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- ☆23May 15, 2019Updated 6 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Azure Managed HSM SSL/TLS Offload Library for F5 and Nginx☆19Sep 18, 2025Updated 5 months ago
- Python library for Myra☆10Jan 21, 2019Updated 7 years ago
- Spring Boot 2.x Demo Projects☆10Apr 3, 2021Updated 4 years ago
- This is a classification task based on CIFAR10,Accuracy is about 87%(without pre-training),The net is CoAtNet(0-5,total coatnet family),w…☆10Oct 1, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Results of the experiments performed for the paper "Open-Set Support Vector Machines".☆11Jul 6, 2023Updated 2 years ago
- CSE-CIC-IDS-2018 analyze with Random Forest☆30Apr 4, 2021Updated 4 years ago
- This is a paper list about Machine Learning for IDSes☆91Aug 27, 2024Updated last year
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆11Jun 27, 2020Updated 5 years ago
- [SNI] offloader with Do[CKER] backend[S]. Starts containers just-in-time. Registers LetsEncrypt certs on-the-fly.☆10May 7, 2019Updated 6 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- ☆12Aug 24, 2022Updated 3 years ago
- The original Protocol-oblivious Forwarding (POF) switch by Huawei☆10Sep 1, 2016Updated 9 years ago
- FL-based intrusion detection system development using model averaging.☆43Dec 18, 2022Updated 3 years ago
- Webhook Authentication for kube-apiserver☆10Updated this week
- 📚 经典技术书籍 PDF 文件,持续更新...☆13Jan 21, 2019Updated 7 years ago
- wolfSSL Asynchronous Cryptography☆17Dec 8, 2025Updated 3 months ago
- ☆10Jan 31, 2024Updated 2 years ago
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 3 years ago
- Ansible automation RedHat Deployed OpenStack (RDO)☆20May 21, 2014Updated 11 years ago
- golang tutorial☆10Mar 11, 2025Updated 11 months ago
- Network Intrusion Detection System using Deep Learning Techniques☆172Dec 15, 2019Updated 6 years ago
- IDS abnormal traffic detection tensorflow☆44Jul 25, 2019Updated 6 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆11May 9, 2023Updated 2 years ago
- Caddy Docker Custom Image☆11Aug 29, 2025Updated 6 months ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago