Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
☆34Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for SIMPAC-2022-260
Users that are interested in SIMPAC-2022-260 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated last year
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- Network Intrusion Detection System Project using Machine Learning with code and Documents☆105Aug 12, 2022Updated 3 years ago
- This Repository contains the code to detect intrusions inside a network. The Intrusion detection system uses anomaly based method to dete…☆10Jul 9, 2018Updated 7 years ago
- ☆13Dec 30, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- ☆14Jun 20, 2021Updated 4 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- Automatic support for (Claude) Skills for any coding agent that supports AGENTS.md☆28Feb 7, 2026Updated last month
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆578Aug 6, 2025Updated 7 months ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- Journal Article: IEEE Access☆20Oct 23, 2023Updated 2 years ago
- CNN+KAN architecture on MNIST (Val Acc: 96%)☆13May 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- This is a Python tool to employ stratified sampling or treatment randomization with uneven numbers in some strata using pandas. Mainly th…☆17Mar 2, 2026Updated 3 weeks ago
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆34Nov 8, 2024Updated last year
- ☆12Oct 8, 2022Updated 3 years ago
- A collection of curated instructions and projects rules for your AI-powered IDE tools.☆14Mar 24, 2025Updated last year
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- This is the first part of a TDOA-system used for estimating the time differences.☆17Feb 18, 2015Updated 11 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- An LLM app with Retrieval Augmented Generation (RAG) built using OpenAI GPT models, Langchain Tokenizers, HuggingFace transformers, and M…☆20Sep 18, 2023Updated 2 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- Deep Reinforcement Learning by using an on-policy adaptation of Maximum a Posteriori Policy Optimization (MPO)☆16Oct 23, 2021Updated 4 years ago
- This repository stores all of the OLCF game of life tutorials☆15Dec 5, 2019Updated 6 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- Machine Learning Based - Intrusion Detection System☆32Jun 21, 2022Updated 3 years ago
- Quality Metrics for evaluating the inter-cluster reliability of Multidimensional Projections☆26Apr 30, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆223Apr 25, 2024Updated last year
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 7 years ago
- Config files for setting up Multitenant Kubeflow on AWS with spot instances☆10Sep 15, 2020Updated 5 years ago
- V-MPO torch version with DMLab30 and GTrXL☆13Mar 1, 2021Updated 5 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago