This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"
☆12Apr 22, 2021Updated 4 years ago
Alternatives and similar repositories for N-BaIoT-reloaded
Users that are interested in N-BaIoT-reloaded are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a classification for N-BaloT which is a Anomaly Detection☆17May 4, 2022Updated 3 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- The detection of Botnet attacks on various IOT Devices using various Machine Learning Models☆15Dec 31, 2019Updated 6 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- 多空间知识图谱☆11Mar 13, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆59Apr 30, 2021Updated 4 years ago
- 使用K-Nearest Neighbors进行DoS / DDoS检测:☆10Mar 21, 2019Updated 7 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Dec 16, 2021Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 5 years ago
- 修改谷歌提供的样例量子卷积神经网络模型,基于KDD99数据集进行训练,实现了网络攻击分类检测。☆39Jan 27, 2022Updated 4 years ago
- VoIP honeypot system☆22Apr 2, 2024Updated last year
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- ☆12Oct 30, 2024Updated last year
- Code for KDD' 21 paper: Time Series Anomaly Detection for Cyber-physical Systems via Neural System Identification and Bayesian Filtering☆42Jan 23, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Source code for self-supervised EEG data transfer learning☆15Feb 9, 2022Updated 4 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆14Aug 28, 2024Updated last year
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- ☆11May 1, 2021Updated 4 years ago
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- [⭐️ WACV 2025 Oral ⭐️] PETALface: Parameter Efficient Transfer Learning for Low-resolution Face Recognition☆31Jun 9, 2025Updated 9 months ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- 操作系统课程设 计,使用c++基于Qt框架开发的任务管理器,ui仿照win10☆11Mar 23, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Repository for author masking☆13Oct 29, 2018Updated 7 years ago
- 📊 Source code for 'Query a Digital Music Store Database' project☆12Aug 29, 2018Updated 7 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- 《机器学习:基于opencv和python的智能图像处理》学习代码☆16Dec 26, 2020Updated 5 years ago
- Deep neural network (DNN) implementation for inference tasks☆13Jul 4, 2019Updated 6 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago