gverticale / network-security-and-cryptographyLinks
Notebooks and Exercises for Network Security and Cryptography
☆13Updated last year
Alternatives and similar repositories for network-security-and-cryptography
Users that are interested in network-security-and-cryptography are comparing it to the libraries listed below
Sorting:
- VM for the SDN class at Polimi☆18Updated last year
- GitHub Desktop tutorial repository☆12Updated last year
- Include a simple Lab with InBand Network Telemetry and P4 for students and researchers☆10Updated last year
- Off-Platform Application example for ONOS Intent Monitor and Reroute service☆11Updated 5 years ago
- ☆16Updated 3 years ago
- This is a dataset of 5G network traffic for use with machine learning tools to benchmark attack detection capabilities for multiple diffe…☆64Updated 7 months ago
- ☆13Updated last year
- Loss Learning Predictor for regression problems☆8Updated 3 years ago
- Network traffic in Python.☆25Updated 2 years ago
- Dataset for the paper M. Polese, L. Bonati, S. D'Oro, S. Basagni, T. Melodia, "ColO-RAN: Developing Machine Learning-based xApps for Open…☆37Updated 9 months ago
- Normalized network traffic entropy-based DDoS detection in P4☆12Updated last year
- eXP-RAN - an Emulator for Gaining Experience with Radio Access Networks, Edge Computing, and Slicing☆18Updated 2 years ago
- Golang implementation of the Named Data Networking protocol stack☆24Updated this week
- ☆26Updated 3 years ago
- ☆10Updated 5 years ago
- This repository contains Trustchain (Blockchain) simulations built with OMNeT++☆26Updated 5 years ago
- A framework for analysis and modeling of IP network flows☆20Updated 9 months ago
- Run real programs in the discrete time simulator ns3☆79Updated 2 years ago
- Simplified ORAN SC RIC with improved usability and xApp examples☆47Updated 2 weeks ago
- The ns-3 topology generator provides a quick and easy way to create a network topology, and generate C++ simulation code for ns-3.☆39Updated 4 years ago
- Trust management model in IoT☆16Updated 3 years ago
- ☆17Updated 7 months ago
- Extension of P4 language tutorials☆12Updated 4 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆34Updated 4 years ago
- Predicting network performance at scale☆33Updated 2 years ago
- ☆23Updated 4 years ago
- Using the ns-3 simulator to implement wireless nodes of blockchain and analyse its performance in terms of transaction throughput, mining…☆12Updated 4 years ago
- In this work, we present a 5G trace dataset collected from a major Irish mobile operator. The dataset is generated from two mobility patt…☆102Updated 5 years ago
- Implementation of Multi-Key Homomorphic Encryption [KKLSS22]☆16Updated 2 years ago
- Appunti di Sicurezza delle Reti a.a. 2018-2019☆9Updated 4 years ago