A project from EECS6414M of Winter 2020 at York University
☆11Mar 26, 2020Updated 6 years ago
Alternatives and similar repositories for Anomaly-Detection-and-Attack-Identification-in-Network-Traffic-Based-on-Graph
Users that are interested in Anomaly-Detection-and-Attack-Identification-in-Network-Traffic-Based-on-Graph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- 2019_操作系统实验_16281047☆11Jun 15, 2019Updated 6 years ago
- My graduation project☆10Feb 16, 2022Updated 4 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- matlab☆10Aug 16, 2018Updated 7 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- The codes correspond to our paper about load frequency control for power systems DAE☆12Mar 24, 2023Updated 3 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Reproduction of "Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks"☆13May 30, 2021Updated 4 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- XSB Prolog☆14Mar 27, 2010Updated 16 years ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Nov 7, 2019Updated 6 years ago
- A repository of load frequency control models implemeted in matlab☆12Feb 22, 2025Updated last year
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- Design of stealth algorithms to corrupt the safe operation of the the power system. This is my Final year project at The University of La…☆17Feb 1, 2019Updated 7 years ago
- Load Frequency Control: A Multi-Agent Deep Deterministic Policy Gradient Approach☆16Oct 29, 2022Updated 3 years ago
- Matlab codes for comparing delayed Kalman filters, with application to the state estimation of a UAV.☆18Apr 16, 2021Updated 4 years ago
- ☆12Feb 18, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Simulation files for the TAC 2020 paper "A Distributed Cyber-Attack Detection Scheme With Application to DC Microgrids"☆19Oct 8, 2021Updated 4 years ago
- ☆15Oct 9, 2018Updated 7 years ago
- The code implementation for the article "Towards Patronizing and Condescending Language in Chinese Videos: A Multimodal Dataset and Fram…☆16Apr 3, 2025Updated 11 months ago
- ☆14Jul 26, 2019Updated 6 years ago
- A Matlab and Simulink simulation of a False Data Injection against KF State Estimation☆16Jul 7, 2022Updated 3 years ago
- 基于SpringCloud的配置中心。支持从自研配置中心拉取配置,并在配置发生变更时同步修改本地环境配置。☆11Jun 28, 2024Updated last year
- Deep neural network (DNN) implementation for inference tasks☆13Jul 4, 2019Updated 6 years ago
- ☆18Sep 30, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers without Shodan Api☆14May 5, 2021Updated 4 years ago
- ☆14May 28, 2023Updated 2 years ago
- This project accelerates deep learning models on the edge with the support of running ensemble learning for performance improvement. The …☆11Jun 21, 2022Updated 3 years ago
- Power System State Estimation with PMU (Phasor Measurement Unit) uses WLS with PMU to estimate Voltage magnitude and angle of a system. T…☆17Oct 15, 2022Updated 3 years ago
- 基于 Java SpringBoot 的项目初始模板🌈,整合了常用框架和主流业务的示例代码。 只需 1 分钟即可完成内容网站的后端!!!大家还可以在此基础上快速开发自己的项目🌍。☆19May 22, 2024Updated last year
- ☆19Mar 29, 2018Updated 8 years ago
- Quantized Tensorflow Estimator for Google EdgeTpu Accelerator, Dev Board and Intel Neural Compute Stick 2☆14May 9, 2019Updated 6 years ago