Rule Extraction from Unsupervised Anomaly Detection in Security
☆23Apr 23, 2025Updated last year
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 7, 2023Updated 2 years ago
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆43Jun 19, 2023Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- ☆31Feb 6, 2025Updated last year
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆26Dec 8, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- source code for USENIX Security paper xNIDS☆62Aug 27, 2024Updated last year
- ☆34Oct 14, 2023Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆74Dec 16, 2021Updated 4 years ago
- ☆21Mar 25, 2024Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- This repo contains all the codes and data for 'Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving T…☆38Jan 4, 2023Updated 3 years ago
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆25May 21, 2022Updated 3 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 4 years ago
- ☆16Jul 16, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆29Aug 6, 2023Updated 2 years ago
- Official code release for the NeurIPS 2021 article Training for the Future: A Simple Gradient Interpolation Loss to Generalize Along Time…☆10Nov 17, 2021Updated 4 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- A platform that provides users with easy access to AI services developed by Montimage and usage of explainable AI techniques (e.g., LIME,…☆10Feb 17, 2026Updated 2 months ago
- ☆13Apr 11, 2026Updated 3 weeks ago
- In-network detection of network attacks using Random Forests and P4☆28Dec 22, 2023Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- 知识图谱推理 复现论文 https://arxiv.org/pdf/2010.04029.pdf☆11Oct 26, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 2019 Fall - Game theory and Multi-agent RL Termproject☆10Dec 13, 2019Updated 6 years ago
- PUPLOOS计算机操作系统,用于操作系统入门教学☆10Apr 19, 2021Updated 5 years ago
- 用户埋点行为日志分析平台,项目主要用于搭建基于Flink、Apache Doris、Redis和MySQL等中间件的用户行为日志收集、存储、分析平台,支持用户自定义查询条件☆11Dec 28, 2023Updated 2 years ago
- Kimariyb 的科研绘图脚本,涵括 很多类型的曲线图☆10Nov 1, 2023Updated 2 years ago
- ☆10Sep 30, 2019Updated 6 years ago
- Flowrest: in-switch flow-level classification with random forests☆37Feb 2, 2026Updated 3 months ago
- Passive DNS Dataset of Domain Resolutions☆18Jun 14, 2022Updated 3 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆37Jan 16, 2021Updated 5 years ago
- Open Knowledge Enrichment for Long-tail Entities, WWW 2020☆14Jun 17, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Contextual knowledge bases☆25Jun 30, 2022Updated 3 years ago
- A P2P network security monitoring system for the Ethereum blockchain.☆15Aug 7, 2024Updated last year
- A LaTeX beamer theme template for UCAS students.☆12Apr 21, 2024Updated 2 years ago
- This repository holds the implementation for the time-decaying in-network heavy-hitter detection algorithm, dSketch, proposed in the pape…☆10Jul 28, 2021Updated 4 years ago
- ☆39Jan 14, 2025Updated last year
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- ☆11Nov 29, 2016Updated 9 years ago