icsdataset / hai
HIL-based Augmented ICS (HAI) Security Dataset
☆148Updated last year
Alternatives and similar repositories for hai:
Users that are interested in hai are comparing it to the libraries listed below
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆39Updated 10 months ago
- Anomaly Detection for SWaT Dataset using Sequence-to-Sequence Neural Networks☆47Updated 5 years ago
- Develope novel security metric using Deep-Learning to detect anomaly attacks into the critical infrastructure systems. This metric will b…☆34Updated 4 years ago
- A tool for data preprocess on iTrust SWaT dataset.☆36Updated 2 years ago
- Modbus Dataset from CSET 2016☆43Updated last year
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆20Updated 3 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆63Updated last year
- Unofficial implementation of the KDD2020 paper "USAD: UnSupervised Anomaly Detection on multivariate time series" on two datasets cited i…☆55Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆31Updated last year
- ICS Cybersecurity PCAP respository☆51Updated 5 years ago
- Public datasets for time series anomaly detection☆94Updated 5 months ago
- ☆63Updated 3 years ago
- ☆47Updated 6 months ago
- Code for the paper "TadGAN: Time Series Anomaly Detection Using Generative Adversarial Networks"☆164Updated 3 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆67Updated last year
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- eTaPR☆12Updated last year
- Code for KDD' 21 paper: Time Series Anomaly Detection for Cyber-physical Systems via Neural System Identification and Bayesian Filtering☆41Updated last year
- Time-series Aware Precision and Recall for Evaluating Anomaly Detection Methods☆16Updated 3 years ago
- This repository is the PyTorch implementation of GAN Ensemble for Anomaly Detection.☆39Updated 3 years ago
- A Transformer-based GAN for Anomaly Detection, International Conference on Artificial Neural Networks, (ICANN2022).☆21Updated last year
- ☆45Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- ☆218Updated 10 months ago
- ☆10Updated last year
- Process-Aware Stealthy Attack Detection☆13Updated 6 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆60Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆80Updated 2 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year