TryKatChup / ML-IOT-malware-analysis
Machine Learning models for IoT traffic malware detection. (Cybersecurity - Alma Mater Studiorum - University of Bologna)
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ML-IOT-malware-analysis
- Our deep learning for computer vision related project for nostalgic poke weebs (Sistemi digitali, Unibo).☆22Updated 9 months ago
- Template utili per il superamento dell'esame di Sistemi Operativi in C, Bash e Java (Ingegneria Informatica T - Alma Mater Studiorum, Uni…☆12Updated 3 years ago
- Appunti di sicurezza dell'informazione (Ingegneria Informatica M - Alma Mater Studiorum, Università di Bologna)☆13Updated 2 years ago
- Raccolta di risposte alle domande tipiche d'esame (Ingegneria Informatica T - Alma Mater Studiorum, Università di Bologna)☆11Updated 7 months ago
- ☆11Updated last year
- Progetto di strumenti basati su Deep Neural Network per la rilevazione di similarità tra password (Tesi Triennale, Ingegneria Informatica…☆12Updated 3 years ago
- Lobby System Template for a multiplayer java game, with chat and other features, using JavaFX and socket TCP (will be extended to UDP).☆18Updated 8 months ago
- Progetto di Controlli Automatici T - Ingegneria Informatica - Alma Mater Studiorum (Università di Bologna)☆9Updated 4 years ago
- Sistema tenuto su con lo scotch per registrare le lezioni unibo in automatico, nella speranza che teams non cambi troppo spesso l'inter…☆11Updated 2 years ago
- Raccolta di risposte alle domande tipiche d'esame (Ingegneria Informatica T - Alma Mater Studiorum, Università di Bologna)☆11Updated 3 years ago
- My personal GitHub page description.☆16Updated 4 months ago
- Personal website☆12Updated 7 months ago
- Appunti di Sistemi Distribuiti (Ingegneria Informatica M - Alma Mater Studiorum, Università di Bologna)☆9Updated 2 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆10Updated 6 months ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆25Updated 2 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆15Updated last year
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆62Updated 3 years ago
- IoT intrusion Detection Model based on neural network and random forests☆43Updated 6 years ago
- Applicazione per esercitarsi con i quiz del corso Ricerca Operativa M. Se ti è stata utile considera di lasciare una stellina alla repo! …☆64Updated last week
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆114Updated 3 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆21Updated 2 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆72Updated 4 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆89Updated 5 years ago
- Machine Learning and Deep Learning models for Anomaly Detection☆8Updated 5 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 5 years ago
- Official repository of the paper "The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems".☆9Updated 2 years ago
- Appunti (incompleti), prove esame svolte e flashcard per studiare la teoria del corso Sistemi Operativi M della prof.ssa Anna Ciampolini …☆19Updated 9 months ago
- A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection☆122Updated 11 months ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆37Updated 5 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆18Updated 3 years ago