Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models
☆18Feb 19, 2025Updated last year
Alternatives and similar repositories for CNN-LSTM-GRU
Users that are interested in CNN-LSTM-GRU are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆14Aug 28, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆13Jul 10, 2024Updated last year
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- IoT Attack Detection with machine learning☆30Jun 12, 2025Updated 9 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- SpringBlade框架JWT认证的漏洞检测工具☆11Apr 22, 2025Updated 11 months ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- ☆11May 1, 2021Updated 4 years ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- ☆20Jul 10, 2024Updated last year
- NEGSC☆47May 30, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Dec 16, 2021Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- 使用K-Nearest Neighbors进行DoS / DDoS检测:☆10Mar 21, 2019Updated 7 years ago
- ☆16Aug 30, 2023Updated 2 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆12Apr 22, 2021Updated 4 years ago
- A Simple python script for detection Potential DDoS Attacks☆13Feb 6, 2023Updated 3 years ago
- PSO feature selection improves classifier performance. Implemented in Jupyter Notebook with pandas, numpy, scikit-learn. PSO done from sc…☆12Jan 30, 2023Updated 3 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Jun 30, 2019Updated 6 years ago
- 秋雨不问梧桐意,城有万心各千寻☆12Apr 21, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated last year
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- DDOS and Bruteforce prevention and notifications☆16Aug 14, 2023Updated 2 years ago
- 操作系统课程设计,使用c++基于Qt框架开发的任务管理器,ui仿照win10☆11Mar 23, 2020Updated 6 years ago
- Repo for Machine Learning Models for Renewable Energy Forecasting Research Paper (DOI: 10.1080/09720510.2020.1721636)☆14Jan 9, 2021Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- The Asset Manager App is a total equipment management system designed to help organisations with a large number of assets, many of which …☆14May 23, 2015Updated 10 years ago
- 《机器学习:基于opencv和python的智能图像处理》学习代码☆16Dec 26, 2020Updated 5 years ago
- As we know that Now-a-days Most of the DDos attacks are often sourced from Cloud and Affect many systems and businesses, resulting in s…☆13Aug 28, 2023Updated 2 years ago
- This is MOPCON content manager system.☆18Jan 3, 2023Updated 3 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago