Shauqi / Attack-and-Anomaly-Detection-in-IoT-Sensors-in-IoT-Sites-Using-Machine-Learning-ApproachesView external linksLinks
Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased use of IoT infrastructure in every domain, threats and attacks in these infrastructures are also growing commensurately. Denial of Service, Data Type Probing, Malicious Control, Malicious Operation, Scan, Spyin…
☆52May 21, 2019Updated 6 years ago
Alternatives and similar repositories for Attack-and-Anomaly-Detection-in-IoT-Sensors-in-IoT-Sites-Using-Machine-Learning-Approaches
Users that are interested in Attack-and-Anomaly-Detection-in-IoT-Sensors-in-IoT-Sites-Using-Machine-Learning-Approaches are comparing it to the libraries listed below
Sorting:
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆76Apr 3, 2021Updated 4 years ago
- A research project of anomaly detection on dataset IoT-23☆106Sep 9, 2024Updated last year
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆13Jan 24, 2026Updated 3 weeks ago
- ☆21Sep 21, 2020Updated 5 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Super Mario is a legendary game we all cherish! In this project, we will deploy Super Mario on Amazon EKS (Elastic Kubernetes Service) us…☆11Feb 3, 2026Updated 2 weeks ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆73Mar 25, 2023Updated 2 years ago
- https://www.facebook.com/hackaphone Information for hackers: Download the app: http://mod-color.com/download/preregister.apk Allow inst…☆11Sep 11, 2016Updated 9 years ago
- My graduation project☆11Feb 16, 2022Updated 4 years ago
- ☆16May 26, 2025Updated 8 months ago
- Multiprocessing in python☆10Aug 20, 2021Updated 4 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- Mission: Create a mobile application that can keep track of a user. When the user logs into to the system, the user's image will be captu…☆14Sep 26, 2018Updated 7 years ago
- A semi-decentralized web application to buy songs as well as royalties through the blockchain☆14Dec 28, 2019Updated 6 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Code for drought detection and attribution using tree-ring reconstructions☆11Feb 19, 2019Updated 6 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆11Apr 8, 2024Updated last year
- The Decentralized Protocol for Interest-Rate Derivatives & Fixed-Rate Lending☆11May 7, 2021Updated 4 years ago
- Appraisal and analytics website for NFTs on Binance Smart Chain☆11Nov 8, 2021Updated 4 years ago
- Integrating with Spotify API and extracting Data. Deploying code on AWS Lambda for Data Extraction. Adding trigger to run the extraction …☆11Jul 5, 2023Updated 2 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 8 months ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Dec 25, 2020Updated 5 years ago
- Google Cloud Platform (GCP) CLI and utils☆14May 6, 2023Updated 2 years ago
- Code used in Tiukhova et al. (2022). Influencer Detection with Dynamic Graph Neural Networks. TGL@Neurips 2022.☆10Feb 9, 2023Updated 3 years ago
- A Low-Impact Internal Latency Measurement Tool for OpenAirInterface☆11Sep 13, 2023Updated 2 years ago
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- A simple example to showcase machine learning model deployment with an API☆10Mar 7, 2022Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- TOOL BYPASS FULL KG LOCKED (SAMSUNG) ALL SECURITY, BYPASS MDM XIAOMI, MORE.☆15Jan 13, 2024Updated 2 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- ☆13Sep 11, 2022Updated 3 years ago
- The Etherlink.com landing page, brought to you by NextJS/Vercel 🤝☆15Feb 5, 2026Updated last week