eewsagar / Add-optimizationLinks
Add optimization
☆11Updated 4 years ago
Alternatives and similar repositories for Add-optimization
Users that are interested in Add-optimization are comparing it to the libraries listed below
Sorting:
- ☆13Updated last year
- Workshop trained project☆8Updated last year
- ☆19Updated 3 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆186Updated last year
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆55Updated last year
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆18Updated 4 years ago
- Traffic dataset USTC-TFC2016☆145Updated 6 years ago
- Leveraging Attention Mechanisms to improve the BERT fine-tuning model for encrypted traffic classification☆16Updated last year
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆632Updated last year
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆20Updated 7 months ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆88Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated 2 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆16Updated 2 years ago
- Attention Model for Network Intrusion Detection☆17Updated 6 years ago
- Code for our submission to the WTMC 2021 workshop☆12Updated 4 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆21Updated 10 months ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆11Updated 2 years ago
- ☆12Updated 6 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Updated 5 years ago
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆34Updated 6 years ago
- Pysharkfeat is a TLS encrypted traffic feature extraction tool from pcaps written in Python by using Wireshark's command line tshark.☆13Updated 3 years ago
- 网络流量分类对比方法汇总☆184Updated 2 months ago
- ☆61Updated 3 months ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆53Updated last year
- AI & Machine Learning: Detection and Classification of Network Traffic Anomalies based on IoT23 Dataset☆79Updated 4 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆77Updated last year
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆44Updated 2 years ago
- get pcap feature☆10Updated 6 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆82Updated 3 years ago
- ☆25Updated 3 years ago