Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks
☆24Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for replication_arxiv_1803_10769
Users that are interested in replication_arxiv_1803_10769 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆42Dec 24, 2023Updated 2 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- TVDiag: A Task-oriented and View-invariant Failure Diagnosis Framework with Multimodal Data☆16Apr 28, 2025Updated last year
- Pytorch implementation of GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection☆29Jul 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- 基于CNN+LSTM时空神经网络的在线流量分类模型☆16Jul 7, 2022Updated 3 years ago
- CPU-based multi-thread implementation of Task-guided and Path-augmented Heterogeneous Network Embedding☆17Jun 22, 2017Updated 8 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆11Jul 11, 2023Updated 2 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)☆15Jul 18, 2024Updated last year
- trying out to implement Deep Tamer☆15Mar 16, 2022Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Jun 23, 2018Updated 7 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- 消防与安防监测预警系统☆12Sep 4, 2020Updated 5 years ago
- implementation of the ADCrowdNet in pytorch☆16Mar 6, 2019Updated 7 years ago
- NEGSC☆48May 30, 2024Updated last year
- Repository for the paper titled "Attention-based Bi-LSTM for Anomaly Detection on Time-Series Data"☆21Apr 12, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 异常检测☆22Sep 26, 2023Updated 2 years ago
- DtnSim: A Python-based simulator for Delay Tolerant Networking☆16Nov 11, 2022Updated 3 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Jun 10, 2022Updated 3 years ago
- The bare necessities of Pandas on the Weld runtime☆14Dec 26, 2022Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Jun 15, 2020Updated 5 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆76Feb 5, 2024Updated 2 years ago
- ☆17Mar 27, 2025Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆21Jul 6, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code and data for paper AspEm: Embedding Learning by Aspects in Heterogeneous Information Networks☆26May 2, 2018Updated 8 years ago
- ☆25May 2, 2025Updated last year
- (AAAI'20) The source code for the paper "Joint Parsing and Generation for Abstractive Summarization".☆15Apr 3, 2020Updated 6 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- Surakav Implementation☆20May 14, 2024Updated last year
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆42Jul 17, 2020Updated 5 years ago
- ☆27Sep 20, 2023Updated 2 years ago