Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
☆119Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for MStream
Users that are interested in MStream are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 4 years ago
- ☆18Jan 12, 2021Updated 5 years ago
- Adversarial Generation of Extreme Samples☆79Jan 10, 2024Updated 2 years ago
- Python implementation of MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams☆38Jun 22, 2022Updated 3 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An Intrusion Detection System based on Deep Belief Networks☆93Oct 27, 2022Updated 3 years ago
- SedanSpot: Detecting Anomalies in Edge Streams☆25Sep 11, 2018Updated 7 years ago
- Deep Reinforcement One-Shot Learning Framework for Artificially Intelligent Classification Systems☆36Apr 30, 2020Updated 6 years ago
- DenseAlert: Incremental Dense-SubTensor Detection in Tensor Streams (KDD'17)☆19Oct 30, 2024Updated last year
- Point-to-Hyperplane NNS Beyond the Unit Hypersphere (SIGMOD 2021)☆13Sep 5, 2021Updated 4 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- A PyTorch implementation of of E-GraphSAGE.☆107Jun 30, 2022Updated 3 years ago
- LSH Scheme based on Longest Circular Co-Substring (SIGMOD 2020)☆14Jul 8, 2021Updated 4 years ago
- A Clustering Based Classification Algorithm☆28Oct 19, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- UnsupervisedPapers.com is an open-source directory of papers on unsupervised machine learning and related topics with links to resources …☆10Dec 26, 2020Updated 5 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- Long-Tail Hashing (Learning to hash from more realistic long-tail datasets), SIGIR 2021, CCF A类.☆16Jul 20, 2021Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆29Sep 10, 2024Updated last year
- ☆19Jun 16, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆298Dec 22, 2023Updated 2 years ago
- Anomaly Detection in Dynamic Graphs☆32Nov 1, 2023Updated 2 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆21Aug 9, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆19Mar 16, 2021Updated 5 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆14Dec 23, 2023Updated 2 years ago
- Code for ICML2020 paper: ''Graph-based Nearest Neighbor Search: From Practice to Theory''☆19Nov 12, 2020Updated 5 years ago
- IDS abnormal traffic detection tensorflow☆44Jul 25, 2019Updated 6 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆38Mar 3, 2023Updated 3 years ago
- The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference …☆640Nov 6, 2025Updated 6 months ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- Code to study the generalisability of benchmark models on non-stationary EHRs.☆15Aug 7, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [TNNLS 2024] Improving Semi-supervised Anomaly Detection with Pseudo-anomaly Generation☆19Jul 2, 2024Updated last year
- Euclid: A Fully In-Network, P4-based Approach for Real-Time DDoS Attack Detection and Mitigation☆13Nov 22, 2021Updated 4 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- ☆40Mar 11, 2020Updated 6 years ago
- This repository contains the code for data investigation, and the link to the multi-source distributed system dataset. This repository is…☆24Nov 17, 2020Updated 5 years ago
- Accurate and Fast ALSH for Maximum Inner Product Search (KDD 2018)☆25Jul 8, 2021Updated 4 years ago