Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
☆59Apr 1, 2017Updated 8 years ago
Alternatives and similar repositories for kdd99-scikit
Users that are interested in kdd99-scikit are comparing it to the libraries listed below
Sorting:
- clean data ,feature selection , svm based kdd99☆26Oct 18, 2019Updated 6 years ago
- Utility for extraction of subset of KDD '99 features from realtime network traffic or .pcap file☆120Mar 21, 2020Updated 5 years ago
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆128Sep 8, 2020Updated 5 years ago
- cnn_1D for kdd99☆21Nov 7, 2018Updated 7 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆57May 15, 2019Updated 6 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Dec 27, 2023Updated 2 years ago
- Analysis and preprocessing of the kdd cup 99 dataset using python and scikit-learn☆22Mar 11, 2020Updated 5 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆271Apr 5, 2020Updated 5 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- This system can match human face over a webcam against the pictures stored in a database, primarily by matching facial features such as f…☆13Sep 5, 2018Updated 7 years ago
- A planet game we're working on.☆11Feb 24, 2025Updated last year
- Library for managing persistent user settings in the Bevy engine.☆14Nov 30, 2024Updated last year
- 🇨🇳翻译: 「rust-ffi-omnibus」 将 Rust 代码 导出, 应用于 其他语言 的例子集合 ❤️更新 ✅☆12May 16, 2019Updated 6 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Stacked five machine learning models: SVM, DT, RF, NB, and KNN, into one “smart detection stacked model” using a stacking classifier to …☆11Aug 9, 2022Updated 3 years ago
- ☆12Oct 17, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- ☆11May 24, 2022Updated 3 years ago
- ☆42Jul 3, 2022Updated 3 years ago
- The EM Algorithm for Gaussian Mixtures (高斯混合模型的EM算法实现)☆12Dec 30, 2018Updated 7 years ago
- Network-wide heavy hitter detection in P4☆13Apr 1, 2020Updated 5 years ago
- ☆13Apr 6, 2023Updated 2 years ago
- Experiment with synthetic domain theory in cubical agda☆14Nov 8, 2022Updated 3 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Jul 14, 2022Updated 3 years ago
- Accepted JOSE papers☆12Feb 14, 2026Updated 2 weeks ago
- Mirror of the OPNFV Fuel Project☆12Sep 8, 2023Updated 2 years ago
- All exercises from private AI Facebook Scholarship☆13Jul 21, 2019Updated 6 years ago
- 基于机器学习的恶意代码检测☆13Apr 2, 2019Updated 6 years ago
- Bonbon Computer☆15May 23, 2023Updated 2 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- Experiment code☆10Sep 17, 2018Updated 7 years ago
- A 3d printed case design for Lichee Pi 4A☆11May 13, 2023Updated 2 years ago
- partner☆16Jul 25, 2018Updated 7 years ago
- Test Env for Security Function Chaining☆11Apr 19, 2023Updated 2 years ago
- Javascript evaluator according to ECMAScript☆10May 22, 2019Updated 6 years ago
- The TacTok automated Coq proof script synthesis tool☆17Jan 9, 2024Updated 2 years ago
- Reference implementation of a two-level RCN model☆11Nov 3, 2017Updated 8 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year