Created Network Intrusion Detection System using Pytorch
☆15Oct 15, 2020Updated 5 years ago
Alternatives and similar repositories for IDS
Users that are interested in IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- python爬虫下载器(html模板或网站前端源代码)☆14Jul 19, 2021Updated 4 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Multimodal Fully Convolutional Neural networks for Semantic Segmentation.☆19Nov 22, 2020Updated 5 years ago
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 2 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- ☆13Sep 10, 2025Updated 6 months ago
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆17Jun 24, 2019Updated 6 years ago
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Jun 26, 2023Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated last year
- A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon☆13Jan 20, 2022Updated 4 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆15Jan 16, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Detecting Malware in PE files☆27Aug 8, 2023Updated 2 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- Basic Guide To Deploy Machine Learning or Deep Learning Model in Heroku using flask Web service frame work.☆21Nov 9, 2022Updated 3 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Jul 10, 2020Updated 5 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆15Dec 2, 2021Updated 4 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆20Jul 8, 2020Updated 5 years ago
- Some cheat sheets created for my own use☆18Dec 8, 2025Updated 3 months ago
- Network System Intrusion Detection using Graph Neural Networks☆21Aug 1, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 本科毕业设计,参考LENET-5模型,将恶意软件转化为灰度图,通过卷积神经网络实现了恶意软件检测分类,准确率达98%。☆26Jul 4, 2020Updated 5 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Capture The Flag competition challenge write-ups☆22Mar 1, 2026Updated 3 weeks ago
- A PowerShell module to test a machine against the CIS Benchmarks☆25Jul 8, 2025Updated 8 months ago
- 🤓 user2code2vec: Embeddings for Profiling Students Based on Distributional Representations of Source Code. Full Paper presented at Learn…☆22May 23, 2019Updated 6 years ago
- EDHOC (RFC 9528): Lightweight authenticated key exchange in C for IoT and constrained devices☆14Updated this week
- 3rd Person RPG project with Unreal Engine 4.21.2☆11Nov 14, 2022Updated 3 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- ☆22Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆22Jan 29, 2020Updated 6 years ago
- An example of iptables-bpf with Go+eBPF☆17Dec 16, 2021Updated 4 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆25Mar 4, 2017Updated 9 years ago
- A repository to perform self-instruct with a model on HF Hub☆32Sep 29, 2023Updated 2 years ago
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- A small OS written from scratch for learning purpose☆21May 5, 2017Updated 8 years ago
- Exploring GPT-3☆31Jul 23, 2021Updated 4 years ago