Used HTTP CSIC 2010 dataset
☆11May 2, 2019Updated 6 years ago
Alternatives and similar repositories for Deep-Learning-WAF
Users that are interested in Deep-Learning-WAF are comparing it to the libraries listed below
Sorting:
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- ☆11Jan 8, 2020Updated 6 years ago
- Machine Learning on dataset HTTP CSIC 2010☆35May 25, 2018Updated 7 years ago
- A GRU deep learning system against attacks in Software Defined Networks (SDN).☆33Apr 19, 2024Updated last year
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆37Jun 27, 2024Updated last year
- ☆12Oct 26, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- paper code commit-fsmafl☆10Mar 18, 2024Updated last year
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- Intelligent Python service with FastAPI for real-time heart disease predictions using machine learning. Features AI-assisted consultation…☆37Aug 24, 2025Updated 6 months ago
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Feb 20, 2026Updated last week
- 几种GAN模型用于文本生成☆13Oct 16, 2019Updated 6 years ago
- This is the official implementation of DIFF. (SIGIR'25)☆17Jun 11, 2025Updated 8 months ago
- 杭电计算机学院-《数据结构》所有上机实验代码☆15Mar 12, 2020Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 7 years ago
- Fight Recognition from Still Images in the Wild @ WACVW2022, Real-world Surveillance Workshop☆13Nov 9, 2022Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- A tool for sharing Markdown and LaTeX formatted math hosted on GitHub Pages — so no backend 😎☆17Feb 22, 2026Updated last week
- Example code for OCDA-Driving☆15Nov 22, 2020Updated 5 years ago
- Qt扫雷游戏☆15Aug 6, 2016Updated 9 years ago
- Web Attacks Detection based on CNN☆17Apr 6, 2019Updated 6 years ago
- UCFCrime Annotation☆20Jan 16, 2020Updated 6 years ago
- 中南大学的机器学习作业☆10Nov 14, 2018Updated 7 years ago
- ics security tools☆20May 13, 2017Updated 8 years ago
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆16Feb 6, 2023Updated 3 years ago
- RNA secondary structure prediction tool☆20Feb 18, 2026Updated last week
- 基于HoshinoBot与AI_image_gen插件,进行快捷的TAG查询与使用。☆16Oct 20, 2022Updated 3 years ago
- A LaTex paper template for security and machine learning conferences☆24Jan 24, 2026Updated last month
- Source code of PurPliance analysis tool.☆18Mar 11, 2024Updated last year
- ☆12Sep 14, 2024Updated last year
- Trying out diffusion training in federated learning setting.☆17Jan 23, 2024Updated 2 years ago
- 吴恩达老师的《机器学习》课程作业,python实现。☆14Mar 23, 2020Updated 5 years ago
- The homework of Web Security☆21Nov 14, 2018Updated 7 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 9 months ago