Apply modern, deep learning techniques for anomaly detection to identify network intrusions.
☆52Mar 12, 2026Updated last month
Alternatives and similar repositories for CML_AMP_Anomaly_Detection
Users that are interested in CML_AMP_Anomaly_Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆15Aug 28, 2024Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Jul 15, 2022Updated 3 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆42Jun 15, 2020Updated 5 years ago
- A Real-Time Network Intrusion Detection System based on Transformer-LSTM model (Major Project)☆16May 27, 2024Updated last year
- ☆13Jul 11, 2025Updated 9 months ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆124Oct 25, 2022Updated 3 years ago
- ☆22Mar 2, 2024Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆77Oct 20, 2020Updated 5 years ago
- ☆18May 9, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 国家电网设备管理系统 于2015年10月通过视频自学做完的这个项目☆12Jan 6, 2017Updated 9 years ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 10 months ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- This is a classification task based on CIFAR10,Accuracy is about 87%(without pre-training),The net is CoAtNet(0-5,total coatnet family),w…☆10Oct 1, 2023Updated 2 years ago
- 基于网络探测和交换机探测网络,管理IP资产☆13Oct 29, 2020Updated 5 years ago
- Industrial Control Systems Network Intrusion Detection☆13Mar 19, 2021Updated 5 years ago
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 3 years ago
- os lectures 2022 spring☆10Aug 25, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Estimating largest Lyapunov exponent of time series data using the method of Wolf et al.☆10Jun 21, 2023Updated 2 years ago
- Code Repository for Paper "HRGCN: Heterogeneous Graph-level Anomaly Detection with Hierarchical Relation-augmented Graph Neural Networks"☆16Sep 24, 2023Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Mar 24, 2023Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆11Nov 26, 2019Updated 6 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- 基于三重DES的数字图像加密算法,能够基于DES密码算法和分组密码运行模式,对输入的任意数字图像进行加密,并输出加密后的图像。同时也能够根据加密后的图像和DES密钥等信息,对加密的图像进行还原,使得解密后的图像和原图像保持一致。CSDN地址:https://blog.csd…☆17Dec 11, 2024Updated last year
- ☆19Aug 10, 2023Updated 2 years ago
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking☆18Jun 6, 2024Updated last year
- [CIKM 2025] Constraint Back-translation Improves Complex Instruction Following of Large Language Models☆17May 23, 2025Updated 11 months ago