This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection"
☆20Jun 30, 2019Updated 6 years ago
Alternatives and similar repositories for DNP3-Dataset-Plus-SnortRules
Users that are interested in DNP3-Dataset-Plus-SnortRules are comparing it to the libraries listed below
Sorting:
- ASTORIA is a framework developed to allow the simulation of attacks and the evaluation of their impact on Smart Grid infrastructures.☆10Feb 5, 2018Updated 8 years ago
- 可信计算实验☆10Jan 3, 2022Updated 4 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- ☆20Jul 10, 2024Updated last year
- ML framework for anomaly detection in the state estimation of the power system☆22Dec 7, 2022Updated 3 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Infineon OPTIGA™ TPM 2.0☆33Aug 6, 2024Updated last year
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- Codes for our paper "Spatial-temporal Adaptive Transient Stability Assessment for Power System under Missing Data"☆27Aug 3, 2020Updated 5 years ago
- 12-752 - Data-Driven Building Energy Management (Fall 2017)☆16Dec 18, 2017Updated 8 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated last year
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Imputation of Missing Data in Tables☆12Aug 24, 2022Updated 3 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- ☆13Aug 28, 2025Updated 6 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- My graduation project☆11Feb 16, 2022Updated 4 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- 基于加权最小二乘算法和快速分解法的电力系统状态估计程序☆40Jul 18, 2019Updated 6 years ago
- My personal profile!☆17Oct 25, 2024Updated last year
- Me and my team hack accounts for players of Prodigy Math Game that only have access to a mobile device/people who can't hack themselves.☆15Feb 4, 2022Updated 4 years ago
- Where we learn together about MY₿ONK's NixOS automagic.☆15Updated this week
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- metwork/mfserv module☆12Updated this week
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago
- Calendari elettronici per la raccolta rifiuti di Chieri e comuni limitrofi☆12Feb 24, 2026Updated last week
- ☆12Jun 1, 2024Updated last year
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago