One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, wherein the network traffic performance is unpredictable, and the problematic space features are numerous. These make intrusion detection systems (IDSs) a challenge within the research arena. Hence, selecting the es…
☆10Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for IDS-Feature-Selection-based-on-GWO-algorithm
Users that are interested in IDS-Feature-Selection-based-on-GWO-algorithm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application of novel EC-GAN method on Network Intrusion Detection☆25Dec 24, 2021Updated 4 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- SpringBlade框架JWT认证的漏洞检测工具☆11Apr 22, 2025Updated last year
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 4 years ago
- Desklib's AI Text Detector☆43Feb 17, 2025Updated last year
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- This project will list the publicly available datasets in IoT domain and other resources that are required to do research in IoT domain☆32Oct 10, 2024Updated last year
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IoT Attack Detection with machine learning☆31Jun 12, 2025Updated 10 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆15Aug 28, 2024Updated last year
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 3 years ago
- 秋雨不问梧桐意,城有万心各千寻☆12Apr 21, 2025Updated last year
- Analysis and preprocessing of the kdd cup 99 dataset using python and scikit-learn☆22Mar 11, 2020Updated 6 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Jul 15, 2023Updated 2 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- 书籍、课程和文章汇总☆12Dec 14, 2022Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- ☆11Nov 26, 2019Updated 6 years ago
- An Intrusion Detection System Based on Machine Learning☆54Mar 12, 2021Updated 5 years ago
- [NeurIPS 2025] Few-Shot Learning from Gigapixel Images via Hierarchical Vision-Language Alignment and Modeling☆27Dec 16, 2025Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Intrusion Detection System using Machine Learning and Ensemble Techniques☆21May 14, 2021Updated 4 years ago
- Datasets for cybersecurity☆18Aug 12, 2025Updated 8 months ago
- The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆59Apr 30, 2021Updated 5 years ago
- 使用贝叶斯、神经网络、KNN进行入侵检测(KDD-CUP99)☆81Jul 1, 2020Updated 5 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Interface detection/一款自动化挖掘未授权访问漏洞的信息收集工具☆29Nov 30, 2023Updated 2 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago