Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection
☆14Aug 28, 2024Updated last year
Alternatives and similar repositories for IoT-Devices-Intrusion-Detection
Users that are interested in IoT-Devices-Intrusion-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- ☆12Apr 8, 2024Updated last year
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- An open emulator project for League of Legends server.☆16Apr 14, 2012Updated 13 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆51Mar 12, 2026Updated 2 weeks ago
- SpringBlade框架JWT认证的漏洞检测工具☆11Apr 22, 2025Updated 11 months ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 9 months ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 6 months ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- The goal of this repository is to help introductory programming students understand objects, inheritance, polymorphism and compiling java…☆33Apr 1, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NILM (Non-intrusive Load Monitoring) 实验代码与结果 本仓库包含使用深度学习模型(LSTM、RNN 和 MultiHead Transformer)进行非侵入式负荷检测的代码和实验结果。NILM 技术用于从总负荷数据中提取各个电器的用电信…☆17Oct 21, 2024Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- 个人笔记☆18Apr 1, 2022Updated 3 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆12Apr 22, 2021Updated 4 years ago
- pytorch 使用AlexNet 实现猫狗二分类☆17May 26, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆19Aug 10, 2023Updated 2 years ago
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking☆18Jun 6, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 基于联邦学习和深度残差网络的sdn入侵检测研究☆18Jun 17, 2024Updated last year
- Source for danielfrg.com☆20Updated this week
- 秋雨不问梧桐意,城有万心各千寻☆12Apr 21, 2025Updated 11 months ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆29Feb 23, 2026Updated last month
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆18Sep 21, 2020Updated 5 years ago
- 操作系统课程设计,使用c++基于Qt框架开发的任务管理器,ui仿照win10☆11Mar 23, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- 《机器学习:基于opencv和python的智能图像处理》学习代码☆16Dec 26, 2020Updated 5 years ago
- [VLDB 2023] Model Selection for Anomaly Detection in Time Series☆44Dec 2, 2025Updated 3 months ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- 异常检测算法☆24Aug 19, 2023Updated 2 years ago