Ruoyu-Li / UAD-Rule-ExtractionLinks
Rule Extraction from Unsupervised Anomaly Detection in Security
☆20Updated 2 months ago
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- ☆24Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆88Updated 3 years ago
- ☆15Updated 2 years ago
- ☆12Updated 3 years ago
- NEGSC☆37Updated last year
- ☆47Updated 3 years ago
- ☆19Updated 4 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆69Updated 3 years ago
- Encrypted Network Traffic Classification using Deep Learning☆52Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆17Updated 3 years ago
- ☆22Updated 3 years ago
- ☆16Updated last year
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆34Updated last year
- ☆17Updated last year
- ☆9Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- Packet Representation Learning for Traffic Classification☆29Updated 6 months ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆92Updated 6 months ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆27Updated 6 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆70Updated 3 months ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆24Updated 2 years ago
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- ☆11Updated 3 years ago
- ☆28Updated last year
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆126Updated 3 months ago