Network Traffic Identification with Convolutional Neural Networks
☆27Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for deeplearning-network-traffic
Users that are interested in deeplearning-network-traffic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- Encrypted Traffic Classification using Deep Learning☆50Mar 27, 2026Updated 2 weeks ago
- ☆18May 9, 2024Updated last year
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆11May 28, 2022Updated 3 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- focal loss (multi-class) for lightgbm/xgboost☆13Apr 18, 2021Updated 4 years ago
- parse strace log☆12Oct 16, 2019Updated 6 years ago
- Machine learning plugins for network traffic☆126Aug 29, 2023Updated 2 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆101Jun 25, 2022Updated 3 years ago
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- Abstract— Violence detection has been investigated extensively in the literature. Recently, IOT based violence video surveillance is an i…☆10Aug 26, 2021Updated 4 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- code for paper "Towards Unbiased Training in Federated Open-world Semi-supervised Learning"☆17Aug 15, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Peach Fuzzer PIT Files☆21Aug 12, 2013Updated 12 years ago
- Analyzes traffic via netflow or live capture and graphs ASN's☆20Sep 26, 2023Updated 2 years ago
- Practical Federated Gradient Boosting Decision Trees (AAAI 2020)☆18May 10, 2023Updated 2 years ago
- FederBoost's Federated Gradient Boosting Decision Tree Algorithm, Federated enabled Membership Inference☆16Dec 13, 2023Updated 2 years ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- ☆24Jan 10, 2024Updated 2 years ago
- Extracting data and analyzing the network traffic flow☆13Jul 19, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22Jan 31, 2024Updated 2 years ago
- Machine Unlearning for Random Forests☆22Jun 17, 2024Updated last year
- Network traffic data pipeline for real-time predictions and building datasets for deep neural networks☆53Sep 4, 2020Updated 5 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- The Github repo for the first course from HackBulgaria - Programming 101☆27Aug 15, 2014Updated 11 years ago
- Ethical Hacking & Cyber Security Course : Complete Package Paid courses for Free 🔥🔥 🔗Download: --> https://www.mediafire.com/file/ts…☆14Jan 1, 2021Updated 5 years ago
- 基于 Connect UDP 和自定义网络协议(简单请求响应协议) 、Reactor 网络模型(one loop per thread + 线程池) 的轻量RPC框架!☆23May 25, 2024Updated last year
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- Deep Learning models for network traffic classification☆764Jan 30, 2026Updated 2 months ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Jun 18, 2024Updated last year
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago