Created Network Intrusion Detection System using Pytorch
☆15Oct 15, 2020Updated 5 years ago
Alternatives and similar repositories for IDS
Users that are interested in IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 用python手写神经网络模型☆11Apr 9, 2019Updated 7 years ago
- python爬虫下载器(html模板或网站前端源代码)☆14Jul 19, 2021Updated 4 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- python手写,不使用现有框架,实现全连接BP神经网络,并利用其在MNIST数据集上完成手写数字识别任务☆13Apr 11, 2022Updated 4 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Multi-Modal Imitation Learning in Partially Observable Environments☆14Sep 5, 2020Updated 5 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated 3 months ago
- Jointly learning policies and latent representations for driver behavior.☆15Jun 6, 2017Updated 8 years ago
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 3 years ago
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Reinforcement Learning -- Imitation Learning, Behavior Cloning, DAgger (Data Aggregation)☆22Apr 15, 2018Updated 8 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- The implement of GAIL with pytorch☆14Mar 11, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 6 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 6 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆16Jan 16, 2023Updated 3 years ago
- Source code of "Variational Imitation Learning with Diverse-quality Demonstrations" in ICML 2020. This github repository includes python …☆20Aug 16, 2021Updated 4 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆13Sep 20, 2023Updated 2 years ago
- Pytorch implementation of InfoGAIL and WGAIL☆19Oct 7, 2022Updated 3 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆19Jul 8, 2020Updated 5 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some cheat sheets created for my own use☆18Dec 8, 2025Updated 4 months ago
- 本科毕业设计,参考LENET-5模型,将恶意软件转化为灰度图,通过卷积神经网络实现了恶意软件检测分类,准确率达98%。☆27Jul 4, 2020Updated 5 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Capture The Flag competition challenge write-ups☆23Apr 17, 2026Updated 2 weeks ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 13 years ago