Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks
☆24Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for replication_arxiv_1803_10769
Users that are interested in replication_arxiv_1803_10769 are comparing it to the libraries listed below
Sorting:
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆39Dec 24, 2023Updated 2 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 5 years ago
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- ☆54Nov 11, 2021Updated 4 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- An improved directory and employee search tool☆10Feb 11, 2025Updated last year
- NEGSC☆47May 30, 2024Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 5 years ago
- PaintsTorch: Automatic Lineart Colorization☆10Jun 21, 2019Updated 6 years ago
- Matlab implementation of TCK☆12Jul 5, 2019Updated 6 years ago
- minimalistic wrapper for chatgpt api for better prompt engineering☆11Jul 9, 2023Updated 2 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Deploys all helm chart folders inside the 'deployment' folder in the root of a repository.☆12Jun 20, 2022Updated 3 years ago
- Simulation and analysis of cloud computing architectures and algorithms using CloudSim Plus☆12Sep 9, 2019Updated 6 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆42Jul 17, 2020Updated 5 years ago
- A simple perceptron implementation in R☆10Oct 17, 2019Updated 6 years ago
- logagent是一个golang编写的高并发,高容错的分布式日志收集系统☆10Mar 23, 2019Updated 6 years ago
- Neural network/Haar cascade trained self-driving RC car using Raspberry Pi☆14Apr 7, 2019Updated 6 years ago
- Applications for Kubernetes☆12Mar 28, 2020Updated 5 years ago
- A data pipeline to generate stats from logs.☆10Oct 12, 2023Updated 2 years ago
- Anomaly Detection for time-series using Multilevel Wavelet Decomposition Networks.☆10Dec 11, 2019Updated 6 years ago
- ☆16Mar 27, 2025Updated 11 months ago
- ☆10Mar 7, 2023Updated 3 years ago
- 任务型多轮对话管理系统 —— 后端☆10Jan 19, 2022Updated 4 years ago
- golang grpc, grpc-web + nginx☆10Feb 25, 2023Updated 3 years ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- The bare necessities of Pandas on the Weld runtime☆14Dec 26, 2022Updated 3 years ago
- This is repository, which contains the "Machine Learning Applications of Big Data" supplementary materials on Coursera☆11Sep 21, 2017Updated 8 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Professor forcing future code☆10Sep 22, 2018Updated 7 years ago
- Time series data similarity matching based on Fourier Transform and Wavelet Transform.☆11Apr 2, 2021Updated 4 years ago
- operator for managing cassandra clusters☆12Jan 7, 2023Updated 3 years ago
- Study notes for "Big Data Analysis with Scala and Spark" on Coursera☆12Mar 29, 2017Updated 8 years ago
- Manage PCI Devices and PCI Device Claims for PCI Passthrough in Harvester☆18Mar 3, 2026Updated last week
- A utility to run health checks for gRPC services☆14May 20, 2024Updated last year
- This is an example of creating an AI agent with flowchart☆12Jul 22, 2024Updated last year