Reduce false-positive alarms via voxel based point cloud analysis.
☆22May 6, 2024Updated last year
Alternatives and similar repositories for pVoxel
Users that are interested in pVoxel are comparing it to the libraries listed below
Sorting:
- ☆11Oct 7, 2023Updated 2 years ago
- ☆26Sep 20, 2023Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- ☆14Sep 15, 2021Updated 4 years ago
- Flow Interaction Graph based attack traffic detection system.☆188May 6, 2024Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆138Oct 30, 2023Updated 2 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- ☆10Mar 11, 2023Updated 2 years ago
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- ☆18Sep 8, 2025Updated 6 months ago
- ☆24Mar 11, 2022Updated 3 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- ☆56Sep 6, 2023Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- ☆36Jun 10, 2024Updated last year
- ☆31Oct 14, 2023Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆50Mar 16, 2024Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆60Jan 7, 2025Updated last year
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Dec 5, 2020Updated 5 years ago
- An Efficient Design of Intelligent Network Data Plane☆59Mar 16, 2023Updated 2 years ago
- ☆13May 15, 2022Updated 3 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆142Apr 29, 2024Updated last year
- Metis: Understanding and Enhancing Regular Expressions in Network☆14Aug 19, 2022Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- ☆20Mar 25, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆61Dec 7, 2025Updated 3 months ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- This is a Python version of CICFlowmeter-V4.0.☆19Mar 12, 2024Updated last year
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 10 months ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Aug 9, 2023Updated 2 years ago
- Surakav Implementation☆19May 14, 2024Updated last year
- ☆20Jul 10, 2024Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago