数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结果可视化 Data and Results Visualization
☆17Jun 18, 2024Updated last year
Alternatives and similar repositories for CIC-DDoS2019-Detection
Users that are interested in CIC-DDoS2019-Detection are comparing it to the libraries listed below
Sorting:
- Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset☆22Nov 25, 2024Updated last year
- Netgpt: Generative pretrained transformer for network traffic☆32Jan 10, 2025Updated last year
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆30Aug 2, 2023Updated 2 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆38Aug 8, 2020Updated 5 years ago
- ☆35Nov 21, 2022Updated 3 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆108Oct 19, 2023Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- ☆12Jun 19, 2024Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Secure and Scalable Federated Learning using Serverless Computing☆12Jan 31, 2024Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- 自习室预约小程序就是用户在使用小程序在线订场服务,在小程序中,可以直观的看到自习室的预约情况、预约费用,然后在线缴付订金。还可以邀请小伙伴一起组队,只需要几分钟就能完成整个预约过程。有了自习室小程序,要查看附近有哪些自习室,直接在微信打开附近的小程序,周边自习室一览无遗;想…☆14Sep 29, 2022Updated 3 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- DDoS attack analysis using Machine Learning☆47Aug 15, 2020Updated 5 years ago
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆13Apr 21, 2024Updated last year
- 根据语法规则生成模拟句子☆12Jan 21, 2019Updated 7 years ago
- 由于BAAI/bge-large-zh 在Hugging Face Clone不下来,手动下载下来,便于使用☆11Sep 16, 2023Updated 2 years ago
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- 基于动态图神经网络的异常流量检测方法☆49May 23, 2023Updated 2 years ago
- ☆12Dec 26, 2024Updated last year
- Code for "LLM Embeddings Improve Test-time Adaptation to Tabular Y|X-Shifts"☆12Oct 17, 2024Updated last year
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- 基于Netfilter的Linux状态检测防火墙,界面设计。华中科技大学网络空间安全学 院2023学年网络安全课程设计项目。☆11Dec 4, 2023Updated 2 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- Datasets for cybersecurity☆16Aug 12, 2025Updated 6 months ago
- Official source code for AAAI 2025 paper: CoRA: Collaborative Information Perception by Large Language Model's Weights for Recommendatio…☆17Dec 11, 2024Updated last year
- Code of Multi-Defendant Legal Judgment Prediction via Hierarchical Reasoning☆13Apr 29, 2024Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- This repository offers an implementation of some common architectures for normalizing flows.☆13Dec 7, 2025Updated 2 months ago
- A Python library for processing and filtering TabLib☆13Aug 24, 2024Updated last year
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Jan 24, 2025Updated last year
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆18Mar 30, 2023Updated 2 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago