Created Network Intrusion Detection System using Pytorch
☆15Oct 15, 2020Updated 5 years ago
Alternatives and similar repositories for IDS
Users that are interested in IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 用python手写神经网络模型☆11Apr 9, 2019Updated 7 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- python手写,不使用现有框架,实现全连接BP神经网络,并利用其在MNIST数据集上完成手写数字识别任务☆14Apr 11, 2022Updated 4 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated 3 months ago
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 2 years ago
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Reinforcement Learning -- Imitation Learning, Behavior Cloning, DAgger (Data Aggregation)☆22Apr 15, 2018Updated 8 years ago
- ☆13Sep 10, 2025Updated 7 months ago
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆17Jun 24, 2019Updated 6 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated last year
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Jun 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The implement of GAIL with pytorch☆14Mar 11, 2020Updated 6 years ago
- A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon☆13Jan 20, 2022Updated 4 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 6 years ago
- A dataset for natural language code search.☆14Feb 13, 2020Updated 6 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Apr 14, 2020Updated 6 years ago
- Source code of "Variational Imitation Learning with Diverse-quality Demonstrations" in ICML 2020. This github repository includes python …☆20Aug 16, 2021Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆43Dec 16, 2022Updated 3 years ago
- Detecting Malware in PE files☆28Aug 8, 2023Updated 2 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A learning-guided approach for executing arbitrary Python code snippets☆16Mar 4, 2024Updated 2 years ago
- Pytorch implementation of InfoGAIL and WGAIL☆19Oct 7, 2022Updated 3 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Build connected security experiences. Starting point to share code, libraries, notebooks, workbooks, and queries for connected experience…☆25Apr 14, 2024Updated 2 years ago
- ☆19Jun 27, 2021Updated 4 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆19Jul 8, 2020Updated 5 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Some cheat sheets created for my own use☆18Dec 8, 2025Updated 4 months ago
- 基于 CNN + LSTM 的网络流量检测☆23Mar 30, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Network System Intrusion Detection using Graph Neural Networks☆22Aug 1, 2023Updated 2 years ago
- Capture The Flag competition challenge write-ups☆23Mar 1, 2026Updated last month
- 🤓 user2code2vec: Embeddings for Profiling Students Based on Distributional Representations of Source Code. Full Paper presented at Learn…☆22May 23, 2019Updated 6 years ago
- ☆23Mar 21, 2026Updated 3 weeks ago
- ☆22Jan 29, 2020Updated 6 years ago
- 前期复习的面试题,秋招奥利给💪🍺☆15Dec 14, 2020Updated 5 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆25Mar 4, 2017Updated 9 years ago