Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection
☆15Aug 28, 2024Updated last year
Alternatives and similar repositories for IoT-Devices-Intrusion-Detection
Users that are interested in IoT-Devices-Intrusion-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- ☆12Apr 8, 2024Updated 2 years ago
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- An open emulator project for League of Legends server.☆16Apr 14, 2012Updated 14 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆52Mar 12, 2026Updated last month
- SpringBlade框架JWT认证的漏洞检测工具☆11Apr 22, 2025Updated 11 months ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 10 months ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- The goal of this repository is to help introductory programming students understand objects, inheritance, polymorphism and compiling java…☆33Apr 1, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NILM (Non-intrusive Load Monitoring) 实验代码与结果 本仓库包含使用深度学习模型(LSTM、RNN 和 MultiHead Transformer)进行非侵入式负荷检测的代码和实验结果。NILM 技术用于从总负荷数据中提取各个电器的用电信…☆17Oct 21, 2024Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- 个人笔记☆18Apr 1, 2022Updated 4 years ago
- pytorch 使用AlexNet 实现猫狗二分类☆17May 26, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆19Aug 10, 2023Updated 2 years ago
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking☆18Jun 6, 2024Updated last year
- 基于联邦学习和深度残差网络的sdn入侵检测研究☆18Jun 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Source for danielfrg.com☆20Mar 24, 2026Updated 3 weeks ago
- 秋雨不问梧桐意,城有万心各千寻☆12Apr 21, 2025Updated 11 months ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆13Apr 22, 2021Updated 4 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆30Feb 23, 2026Updated last month
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- 操作系统课程设计,使用c++基于Qt框架开发的任务管理器,ui仿照win10☆11Mar 23, 2020Updated 6 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- 《机器学习:基于opencv和python的智能图像处理》学习代码☆16Dec 26, 2020Updated 5 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- 老板.skill、童锦程.skill、特朗普.skill、同事.skill.....一场关于人类的蒸馏实验☆105Apr 8, 2026Updated last week
- [VLDB 2023] Model Selection for Anomaly Detection in Time Series☆43Dec 2, 2025Updated 4 months ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago