A SDN project to implement moving target defense
☆11Nov 21, 2014Updated 11 years ago
Alternatives and similar repositories for mtd
Users that are interested in mtd are comparing it to the libraries listed below
Sorting:
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Official source code of the paper: Perturbation Seeking Generative Adversarial Networks: A Defense Framework for Remote Sensing Image Sce…☆14Jan 6, 2022Updated 4 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.☆36Jan 9, 2026Updated 2 months ago
- Enjoy your typos☆12Oct 7, 2022Updated 3 years ago
- ROS node for collecting data from one or more cameras/depth sensors☆11Jan 22, 2015Updated 11 years ago
- Visualizations of music semantics calculus using Spotify and deep embeddings.☆17Aug 5, 2023Updated 2 years ago
- Checkpoint/Restore tool☆19Aug 14, 2020Updated 5 years ago
- Using WoLF (win or learn fast) PHC (policy hill climbing) algorithm to implement stochastic games☆15Jun 14, 2019Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆38Feb 7, 2019Updated 7 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆18Sep 21, 2020Updated 5 years ago
- sketch 43 file web viewer, inspect☆18Jun 7, 2017Updated 8 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- The code of paper "Adversarial Label-Flipping Attack and Defense for Graph Neural Networks" (ICDM 2020)☆18Mar 19, 2021Updated 5 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆16Apr 29, 2024Updated last year
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 5 years ago
- ☆12Oct 17, 2022Updated 3 years ago
- SDN NFV architecture for DDoS mitigation with reinforcement learning: An implementation with ONOS and Containernet☆10Sep 1, 2024Updated last year
- Convolutional Neural Network Based Optimization Approach for Wireless Resource Management☆10Apr 7, 2021Updated 4 years ago
- Online Service Function Chain Deployment for Live-Video virtualized Content Delivery Networks, a Deep Reinforcement Learning approach pap…☆10Nov 8, 2021Updated 4 years ago
- ☆12Jun 8, 2017Updated 8 years ago
- Courses in UCAS☆14Jun 12, 2023Updated 2 years ago
- Paper collection of next-generation network resource allocation by machine learning☆11Mar 18, 2020Updated 6 years ago
- ☆15Sep 21, 2020Updated 5 years ago
- Framework App driven☆10Jun 5, 2025Updated 9 months ago
- ☆14Jul 3, 2020Updated 5 years ago
- Bohatei is a first of its kind platform that enables flexible and elastic DDoS defense using SDN and NFV.☆94Apr 16, 2016Updated 9 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- ☆11Apr 21, 2021Updated 4 years ago
- Give your AI assistant access to your Fitbit data for personalized health insights, trend analysis, and automated tracking. Works with Cl…☆26May 27, 2025Updated 9 months ago
- AppyBuilder, a Visual Drag-&-Drop interface allowing anyone to design and build Android Mobile Apps with little or No Coding Skills!☆20Mar 1, 2019Updated 7 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- Anomaly Detection Discriminative GAN (ADD-GAN)☆14Oct 9, 2017Updated 8 years ago