S-Mohammad-Hashemi / RePOView external linksLinks
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
☆25Dec 20, 2020Updated 5 years ago
Alternatives and similar repositories for RePO
Users that are interested in RePO are comparing it to the libraries listed below
Sorting:
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- ☆13Apr 17, 2024Updated last year
- ☆10Mar 7, 2023Updated 2 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆48Aug 10, 2020Updated 5 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Feb 27, 2025Updated 11 months ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Nov 7, 2019Updated 6 years ago
- ☆24Mar 11, 2022Updated 3 years ago
- ☆28May 6, 2021Updated 4 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Dec 5, 2020Updated 5 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- Dockerization of CICFlowMeter, with an entry point to accept command line parameters when running the container.☆14May 8, 2020Updated 5 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- ☆20Mar 25, 2024Updated last year
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆18Sep 21, 2020Updated 5 years ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Jul 12, 2024Updated last year
- ☆20Jul 10, 2024Updated last year
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- ☆21Jan 27, 2025Updated last year
- ☆20Jan 20, 2021Updated 5 years ago
- A unified CLI and library for managing architectural artifacts (RFCs, ADRs, Decomposition Plans) with plugins, impact analysis, and healt…☆29Dec 15, 2025Updated last month
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26May 8, 2020Updated 5 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection☆28Jan 17, 2024Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year