Encrypted Traffic classification
☆17Jan 5, 2020Updated 6 years ago
Alternatives and similar repositories for Network-Traffic-Classification
Users that are interested in Network-Traffic-Classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encrypted Traffic Classification using Deep Learning☆50Mar 27, 2026Updated 2 weeks ago
- Encrypted traffic classification use CNN☆34Dec 7, 2020Updated 5 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆49Aug 10, 2020Updated 5 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- using deep learning to classify the encrypted network traffic☆172Dec 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆94Jan 2, 2024Updated 2 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Jun 23, 2018Updated 7 years ago
- Pytorch implementation of deep packet: a novel approach for encrypted traffic classification using deep learning☆250Mar 1, 2023Updated 3 years ago
- using 2d-cnn to classify network traffic☆21Apr 10, 2020Updated 6 years ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆129May 1, 2023Updated 2 years ago
- Wang Wei's End-to-end encrypted traffic classification with one-dimensional convolution neural networks (scripts and article))☆36Sep 21, 2020Updated 5 years ago
- ☆58Dec 8, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆121Jul 9, 2020Updated 5 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- Self-attentive deep learning method for online traffic classification and its interpretability (CN21 & NetAI20)☆40Jun 27, 2024Updated last year
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Dec 5, 2020Updated 5 years ago
- Based on: https://arxiv.org/abs/2202.07453☆11Jan 15, 2023Updated 3 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆42Aug 10, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Deep Packet Inspection application that provides encrypted protocol recognition based on Machine Learning☆21Jun 18, 2018Updated 7 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- ASR, End-to-End, end2end, Speech Recognition, 端到端语音识别☆12Oct 25, 2020Updated 5 years ago
- ☆14Dec 14, 2022Updated 3 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- A Python implementation of the Hopfield network used to solve the traveling salesman problem☆10Apr 11, 2019Updated 7 years ago
- AUC值ROC曲线☆20Mar 31, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Implementation of ArcFace in Keras☆11Feb 9, 2019Updated 7 years ago
- ☆11Oct 18, 2023Updated 2 years ago
- A Keras-compatible generator for creating balanced batches☆16Mar 23, 2024Updated 2 years ago
- ☆14Sep 29, 2021Updated 4 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- ☆11Apr 23, 2024Updated last year
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year