Ruoyu-Li / UAD-Rule-ExtractionLinks
Rule Extraction from Unsupervised Anomaly Detection in Security
☆19Updated last month
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆72Updated 3 years ago
- NEGSC☆38Updated last year
- ☆12Updated 3 years ago
- ☆25Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆68Updated 2 months ago
- ☆15Updated last year
- ☆19Updated last year
- ☆27Updated 4 months ago
- ☆18Updated 4 years ago
- A PyTorch implementation of of E-GraphSAGE.☆89Updated 2 years ago
- Packet Representation Learning for Traffic Classification☆29Updated 5 months ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆12Updated 10 months ago
- ☆48Updated 3 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆14Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- ☆9Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- ☆25Updated 11 months ago
- ☆22Updated 3 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆33Updated 10 months ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆13Updated 3 months ago
- ☆17Updated 10 months ago
- ☆15Updated last year
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆34Updated 6 months ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- ☆16Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆70Updated 3 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year