Apply modern, deep learning techniques for anomaly detection to identify network intrusions.
☆51Mar 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for CML_AMP_Anomaly_Detection
Users that are interested in CML_AMP_Anomaly_Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆14Aug 28, 2024Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆12Jul 11, 2025Updated 8 months ago
- ☆21Mar 2, 2024Updated 2 years ago
- 前端基于 Vue2.x+ElementUI实现页面布局,后端基于Node.js+Koa2实现接口封装,数据库基于MongoDB实现数据存储,实现一个简单的前后端分离的后台管理系统,涵盖字典管理、菜单管理、用户管理、日志管理、角色授权等基本功能,对于纯前端的开发者独立实现全栈…☆10Jun 7, 2022Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆76Oct 20, 2020Updated 5 years ago
- ☆18May 9, 2024Updated last year
- ☆15Apr 20, 2024Updated last year
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- Industrial Control Systems Network Intrusion Detection☆13Mar 19, 2021Updated 5 years ago
- ☆10May 29, 2024Updated last year
- Estimating largest Lyapunov exponent of time series data using the method of Wolf et al.☆10Jun 21, 2023Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆223Apr 25, 2024Updated last year
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- In-vehicle gateway intrusion detection based on ARM☆13Jan 26, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- [CIKM 2025] Constraint Back-translation Improves Complex Instruction Following of Large Language Models☆17May 23, 2025Updated 10 months ago
- ☆18Apr 10, 2025Updated 11 months ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- AutoEncoder implements by keras. Including AE, DAE, DAE_CNN, VAE, VAE_CNN, CVAE, Sparse AE, Stacked DAE.☆41Apr 7, 2020Updated 5 years ago
- A dApp for maintaining patient records of all patients by any hospital in a single space created using Blockchain and IPFS.☆14Feb 14, 2022Updated 4 years ago
- University Project for Anomaly Detection on Time Series data☆127Jun 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- ☆17Feb 5, 2025Updated last year
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆50Aug 2, 2019Updated 6 years ago
- 基于最新版本的thinkphp6.0以上底层编写的一整套纯净版后台,拥有前后端分离器,内置一键快速CURD命令,kbuilder快速构建器[一个方法增删改查],插件管理模块,高级视觉扁平化后台界面[独一的风格]☆14Oct 10, 2020Updated 5 years ago
- ☆19Oct 4, 2022Updated 3 years ago
- Built an Autoencoder model to identify anomalies in a retail transaction dataset☆27Jun 11, 2023Updated 2 years ago
- Synthesized speech recognition☆38Jun 9, 2025Updated 9 months ago