Ruoyu-Li / UAD-Rule-ExtractionLinks
Rule Extraction from Unsupervised Anomaly Detection in Security
☆20Updated 4 months ago
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
Sorting:
- ☆16Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- A PyTorch implementation of of E-GraphSAGE.☆90Updated 3 years ago
- ☆25Updated last year
- ☆13Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆70Updated 4 months ago
- Packet Representation Learning for Traffic Classification☆29Updated 8 months ago
- ☆16Updated last year
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆71Updated 3 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆17Updated 2 years ago
- ☆19Updated 4 years ago
- ☆22Updated 3 years ago
- ☆49Updated 3 years ago
- NEGSC☆37Updated last year
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆10Updated 2 years ago
- Related code and datasets on NetBench: A Large-Scale and Comprehensive Network Traffic Benchmark Dataset for Foundation Models☆31Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆53Updated last year
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆28Updated 8 months ago
- ☆18Updated last year
- A tunneled flooding traffic detection system.☆26Updated 8 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆17Updated 4 years ago
- ☆28Updated last year
- source code for USENIX Security paper xNIDS☆46Updated last year
- ☆15Updated 2 years ago
- Implementation of AppScanner☆43Updated 3 years ago
- ☆11Updated 3 years ago
- ☆50Updated last year