bimalgupta150 / A-novel-SVM-kNN-PSO-Ensemble-method-for-intrusion-detection-system-View external linksLinks
☆11Nov 26, 2019Updated 6 years ago
Alternatives and similar repositories for A-novel-SVM-kNN-PSO-Ensemble-method-for-intrusion-detection-system-
Users that are interested in A-novel-SVM-kNN-PSO-Ensemble-method-for-intrusion-detection-system- are comparing it to the libraries listed below
Sorting:
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆12Jun 21, 2021Updated 4 years ago
- 使用深度卷积对抗生成神经网络(DCGAN)生成新的人脸图像☆16Aug 3, 2018Updated 7 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- 一款命令行fofa查询工具,可快速将查询结果导出到表格中☆13Feb 22, 2024Updated last year
- GitHub API Data Gatherer, Supports multi-token rotation, deep fetching, field filtering, and linked requests. Built as a proxy to the off…☆13Jan 5, 2024Updated 2 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- [AISTATS 2025] Official implementation of "Adversarial Vulnerabilities in Large Language Models for Time Series Forecasting"☆15Apr 30, 2025Updated 9 months ago
- 《精通scrapy网络爬虫》中代码☆11May 15, 2020Updated 5 years ago
- 批量备案信息查询☆13Oct 31, 2022Updated 3 years ago
- 遗传算法优化卷积神经网络(人脸识别分类)☆13Jun 13, 2019Updated 6 years ago
- wscan自用指纹库☆12May 24, 2024Updated last year
- A dApp for maintaining patient records of all patients by any hospital in a single space created using Blockchain and IPFS.☆14Feb 14, 2022Updated 4 years ago
- 卷积神经网络提取特征并用于SVM//www.cnblogs.com/chuxiuhong/p/6132814.html☆15May 10, 2018Updated 7 years ago
- Intrusion Detection System using Machine Learning and Ensemble Techniques☆19May 14, 2021Updated 4 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆145Oct 12, 2021Updated 4 years ago
- 毕业设计——基于监督学习的web入侵检测系统(0day收集器)☆63Dec 7, 2016Updated 9 years ago
- An intrusion detection system prototype for attacks on automobile CAN buses.☆22Oct 13, 2020Updated 5 years ago
- Rosbot is an open source voice dialogue robot project, which aims to enable ROS developers to quickly create personalized virtual assista…☆20Jan 22, 2021Updated 5 years ago
- 此项目用来提取收集以往泄露的密码中符合条件的强弱密码☆18Apr 1, 2019Updated 6 years ago
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆19May 20, 2024Updated last year
- A tool for rapid network security operations, facilitating swift asset discovery. It builds an asset library, aiding security teams in ef…☆16Updated this week
- TeamTNT 挖矿病毒样本备份☆20May 4, 2022Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- 记录京东秒杀程序的一些过程文档。 能预约秒杀 mate60 茅台等☆19Dec 23, 2023Updated 2 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 6 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- Transfer via Extreme learning machine Auto-encoder Method (TEAM)☆20Sep 9, 2022Updated 3 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago