Network Traffic Identification with Convolutional Neural Networks
☆27Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for deeplearning-network-traffic
Users that are interested in deeplearning-network-traffic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encrypted Traffic Classification using Deep Learning☆50Jul 5, 2018Updated 7 years ago
- Unknown protocol identification theory research and clustering experiment☆17Nov 27, 2019Updated 6 years ago
- ☆18May 9, 2024Updated last year
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆11May 28, 2022Updated 3 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- focal loss (multi-class) for lightgbm/xgboost☆13Apr 18, 2021Updated 4 years ago
- A pytorch implementation of focal loss☆11Oct 13, 2023Updated 2 years ago
- Machine learning plugins for network traffic☆125Aug 29, 2023Updated 2 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- [ICCV' 23] FedPD: Federated Open Set Recognition with Parameter Disentanglement☆10Mar 25, 2024Updated 2 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆101Jun 25, 2022Updated 3 years ago
- ☆15Oct 27, 2023Updated 2 years ago
- ☆62May 3, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Oct 1, 2020Updated 5 years ago
- 《第一行代码第三版》随书资源☆14Apr 12, 2020Updated 5 years ago
- Clone of andLess - an android audio player that can play lossless files (FLAC/APE/MPC/WV). Original link: http://code.google.com/p/andles…☆12Jul 25, 2015Updated 10 years ago
- code for paper "Towards Unbiased Training in Federated Open-world Semi-supervised Learning"☆17Aug 15, 2023Updated 2 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- 机器学习应用平台/数据预测/文本分类☆12May 24, 2019Updated 6 years ago
- This reposotory is for a project about Distributed TDMA for Mobile UWB Network Localization☆15Jun 1, 2021Updated 4 years ago
- FederBoost's Federated Gradient Boosting Decision Tree Algorithm, Federated enabled Membership Inference☆16Dec 13, 2023Updated 2 years ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- An all in one netflow collector with a web front end. Designed for small networks.☆31May 23, 2015Updated 10 years ago
- ☆24Jan 10, 2024Updated 2 years ago
- ☆22Jan 31, 2024Updated 2 years ago
- Machine Unlearning for Random Forests☆22Jun 17, 2024Updated last year
- Network traffic data pipeline for real-time predictions and building datasets for deep neural networks☆53Sep 4, 2020Updated 5 years ago
- Hybris scripting language interpreter engine and standard library modules.☆22Sep 12, 2010Updated 15 years ago
- The Github repo for the first course from HackBulgaria - Programming 101☆27Aug 15, 2014Updated 11 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ethical Hacking & Cyber Security Course : Complete Package Paid courses for Free 🔥🔥 🔗Download: --> https://www.mediafire.com/file/ts…☆14Jan 1, 2021Updated 5 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- This code allows a DJI Matrice-100 drone, equipped with a USRP-B205 mini SDR, to detect and move towards the source of a RF carrier trans…☆17Sep 15, 2017Updated 8 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- A Deep Packet Inspection application that provides encrypted protocol recognition based on Machine Learning☆21Jun 18, 2018Updated 7 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- ☆17Mar 2, 2018Updated 8 years ago