htn274 / CAN-SupCon-IDSLinks
☆16Updated 2 years ago
Alternatives and similar repositories for CAN-SupCon-IDS
Users that are interested in CAN-SupCon-IDS are comparing it to the libraries listed below
Sorting:
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆34Updated 2 years ago
- Code for the paper "Detecting In-vehicle Intrusion via Semi-supervised Learning-based Convolutional Adversarial Autoencoders"☆39Updated 2 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆11Updated last year
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Updated 4 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆32Updated 2 months ago
- ☆20Updated 5 months ago
- Reproduction of "Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks"☆12Updated 4 years ago
- An intelligent classifier based Intrusion Detection System for IoV’s based on Neural Networks like optimized CNN, transfer learning and e…☆18Updated 3 years ago
- ☆15Updated 2 years ago
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆16Updated last week
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆44Updated 2 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated last year
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 9 months ago
- ☆21Updated 4 years ago
- ☆42Updated 2 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆13Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 9 months ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆12Updated 11 months ago
- GAN_based_Intrusion_Detection_System_for_in-vehicle_network☆13Updated 6 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆9Updated 2 years ago
- ☆9Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago