anandsagarthumati9848 / HIDSView external linksLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14May 16, 2021Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆55May 15, 2025Updated 9 months ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆49Aug 2, 2019Updated 6 years ago
- Vanilla, Convolutional, VAE, Conditional VAE☆20Dec 20, 2018Updated 7 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- ☆10Oct 20, 2016Updated 9 years ago
- The application describes how data can be stored, structured and read out on a local OPC UA server built with Node-Red. The data used are…☆12Oct 13, 2023Updated 2 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 4 months ago
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆18Jan 28, 2026Updated 2 weeks ago
- 遗传算法排课☆14Sep 3, 2019Updated 6 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- ☆12Apr 9, 2022Updated 3 years ago
- Project champion developed for Hackathon RN Digital at the Campus Party Natal-RN 2018.☆10Dec 10, 2022Updated 3 years ago
- Este é o repositório da participação do IFRN no Hacktoberfest☆16Oct 6, 2020Updated 5 years ago
- USTC网络安全实验室网站源码☆11Sep 1, 2022Updated 3 years ago
- ☆12Apr 10, 2022Updated 3 years ago
- ☆13Aug 18, 2025Updated 5 months ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- Bots for the board game quoridor implemented using four algorithms: minimax, minimax with alpha beta pruning, expectimax and monte carlo …☆13Sep 28, 2024Updated last year
- RISC-V Static Binary Translator☆18Mar 6, 2019Updated 6 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- A compiler of C subset by USTB OWL Wheel Lab.☆13Feb 9, 2023Updated 3 years ago
- vs code extension to swap things☆15Dec 11, 2019Updated 6 years ago
- ☆17May 26, 2022Updated 3 years ago
- A toy implementation about Program Dependence Graph using LLVM☆13Sep 27, 2023Updated 2 years ago
- r2con CTFD themes☆15Dec 23, 2021Updated 4 years ago
- ☆12Dec 2, 2017Updated 8 years ago
- Python module for latest CyberSpace updates.☆16May 26, 2023Updated 2 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- A simple example of using Windows Hypervisor Platform (WHP)☆12Dec 18, 2020Updated 5 years ago
- Enhanced version of the discontinued KShare by @ArsenArsen☆14Jun 5, 2020Updated 5 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- this☆17Jun 15, 2019Updated 6 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 3 weeks ago
- Learn Rust With Entirely Too Many Linked Lists☆15Apr 4, 2021Updated 4 years ago
- ☆14Aug 17, 2024Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Dec 30, 2025Updated last month
- Plugin for CTFd which shows a countdown until the start of the event and then until the end of the event.☆14Oct 30, 2018Updated 7 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 4 months ago