Script scenarios and graph processing scripts for simulations used in "Interest Flooding Attack and Countermeasures in Named Data Networking" paper by Afanasyev et al. (IFIP Networking 2013)
☆20Jul 23, 2015Updated 10 years ago
Alternatives and similar repositories for ndnSIM-ddos-interest-flooding
Users that are interested in ndnSIM-ddos-interest-flooding are comparing it to the libraries listed below
Sorting:
- Rocketfuel-based topology generator for ndnSIM preferred format (randomly assigned link delays and bandwidth, based on estimated types of…☆15Mar 7, 2013Updated 13 years ago
- promtstd 🤖 - универсальный стандарт для хранения и использования промтов в AI. 📚 Основан на Markdown, обеспечивает легкость чтения и ст…☆12May 2, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- lumiere client☆30Mar 2, 2026Updated last week
- Bill of Materials and all parts for Ultimaker Original Heated Bed Upgrade☆12Sep 7, 2021Updated 4 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Utils for Cryptography class (1047622)☆14Nov 13, 2025Updated 3 months ago
- Promptopia is an open-source AI prompting tool for modern world to discover, create, and share creative prompts☆12May 27, 2023Updated 2 years ago
- ☆15May 21, 2024Updated last year
- Facebook phishing page☆10Oct 4, 2020Updated 5 years ago
- A script to copy/backup the backup files from a Proxmox server to an external harddrive and a tape device☆10Apr 30, 2025Updated 10 months ago
- Total Anomaly Detection System for software logs and traces☆10Dec 7, 2015Updated 10 years ago
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- Simple and minimalistic Mopidy HTTP client, touch friendly, works in most (mobile) web browsers☆12Jun 8, 2015Updated 10 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Preparing Proxmox VE after installation☆16Feb 22, 2020Updated 6 years ago
- Scripts and ideas shared with the community.☆14Feb 27, 2026Updated last week
- Обёртка над Telegram Bot API для Google Apps Scripts☆11Apr 16, 2023Updated 2 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- ☆11Jul 15, 2024Updated last year
- Just a simple program that uses the ElevenLabs text to speech AI. All it does is take a string and output the audio.☆10Feb 19, 2023Updated 3 years ago
- Mac Address Flooding Script☆11Dec 9, 2015Updated 10 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- iOS Developer Swift/Objective-C Skills☆12Aug 23, 2021Updated 4 years ago
- Converting Aerial | Satellite images in RGB to the digital map using GAN (Pix2Pix).☆12Dec 7, 2020Updated 5 years ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Swift toolchain for Linux☆14Jun 2, 2024Updated last year
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆15Sep 24, 2024Updated last year
- Query.AI plugin for Kibana