golomb1 / CIoTA-Collaborative-IoT-Anomaly-detection-via-BlockchainView external linksLinks
☆12Sep 18, 2018Updated 7 years ago
Alternatives and similar repositories for CIoTA-Collaborative-IoT-Anomaly-detection-via-Blockchain
Users that are interested in CIoTA-Collaborative-IoT-Anomaly-detection-via-Blockchain are comparing it to the libraries listed below
Sorting:
- plugable consensus PBFT for hyperledger/fabric☆10Dec 21, 2017Updated 8 years ago
- A simulator for the Lightning Network☆13Jun 25, 2020Updated 5 years ago
- Repository to the DAGsim paper☆14Nov 16, 2021Updated 4 years ago
- Integration of the BFT consensus library into Fabric☆30Jan 14, 2022Updated 4 years ago
- CIDDS: A Configurable and Interactive DAG-based Distributed Ledger Simulation Framework☆15Nov 22, 2022Updated 3 years ago
- Clustering of pseudoanonymous bitcoin addresses into related entities using structure of the bitcoin transaction graph and de-anonymizati…☆17Nov 8, 2017Updated 8 years ago
- Everything you need to know about how to make an Ethereum blockchain dapp on android using Solidity, Web3j, Infura, etc.☆22Oct 1, 2019Updated 6 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- Inside the SDK, we provide PCN gateway API encapsulation which you can use to implement the transaction querying, transaction interface c…☆38Sep 19, 2025Updated 4 months ago
- 区块链底层技术的研究和尝试,ETH智能合约,DAPP,IPFS,超级账本,联盟链Hyperledger Fabric☆33Nov 22, 2022Updated 3 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 4 years ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆15Jun 26, 2022Updated 3 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 6 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- Vulnerability management tool that provides Buildroot SBOM generation and CVE Analysis of target images.☆11Jan 2, 2026Updated last month
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- ☆13May 5, 2018Updated 7 years ago
- Implemented e-NSGA II Algorithm to solve a classical hub-location and vehicle scheduling problem☆10Jul 4, 2021Updated 4 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- A minimalist text editor☆10Nov 12, 2023Updated 2 years ago
- C++ coroutine protocol library.☆12Sep 2, 2025Updated 5 months ago
- Pure Scheme Gopher Server☆11Jan 21, 2012Updated 14 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- ☆14Feb 2, 2019Updated 7 years ago
- ☆16Oct 28, 2020Updated 5 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Nov 26, 2025Updated 2 months ago
- Smart Contracts for decentralized access control for IoT data using Blockchain and trusted oracles☆11Apr 14, 2019Updated 6 years ago
- A collection of Ghidra scripts and tools to improve UEFI Binary Analysis and automation☆12Jun 25, 2024Updated last year
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- Display and label a live table of hosts in your network☆13Nov 25, 2016Updated 9 years ago
- ☆21Sep 10, 2024Updated last year
- Create single-executable models of distributed systems.☆19Jun 28, 2021Updated 4 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 2 months ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- 基于Solidity语言的,适用于存证场景的智能合约示例☆16Oct 25, 2017Updated 8 years ago