A Real-Time Network Intrusion Detection System based on Transformer-LSTM model (Major Project)
☆16May 27, 2024Updated last year
Alternatives and similar repositories for A-Real-Time-NIDS-based-on-Transformer-LSTM-model
Users that are interested in A-Real-Time-NIDS-based-on-Transformer-LSTM-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- ☆103Nov 25, 2023Updated 2 years ago
- ☆19Jan 2, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated last year
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 10 months ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- Load Tensorflow pb file using Bert/TextCNNs, an ensemble model using Java.☆10Aug 20, 2021Updated 4 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆15Aug 28, 2024Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆19Aug 10, 2023Updated 2 years ago
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking☆18Jun 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆23May 24, 2025Updated 11 months ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- ☆20Jan 20, 2021Updated 5 years ago
- a lightweight tool to analyse h264 and h265 raw stream.☆11Nov 13, 2024Updated last year
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- ☆14May 1, 2023Updated 3 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- Go implementation of the Model Context Protocol (MCP) with comprehensive Streamable HTTP, STDIO, and SSE support.☆59Mar 30, 2026Updated last month
- Implementation, Comparison of KCF(Kernelized Correlation Filter) and DL methods for single object tracking☆15Dec 9, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BARE-METAL Example of the FatFs running on the SDMMC of the STM32F746G-DISCO No HAL at all... full bare-metal☆12Jun 22, 2018Updated 7 years ago
- 使用django对情感分析功能进行封装,里面包含使用情感词典和Bert模型进行情感分类,最后可以使用tensorFlow serving将模型部署在docker中运行。☆12Sep 23, 2019Updated 6 years ago
- Provides an ensemble model to deploy a YOLOv8 TensorRT model to Triton☆13Mar 28, 2024Updated 2 years ago
- Pytorch implementation of UTRAD☆29Apr 23, 2022Updated 4 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 3 years ago
- [TMM] Fusion-Mamba for Cross-modality Object Detection.☆67Oct 21, 2025Updated 6 months ago
- ☆20Feb 3, 2021Updated 5 years ago
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆51Apr 17, 2026Updated 2 weeks ago
- Network System Intrusion Detection using Graph Neural Networks☆22Aug 1, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Classification and aggregation of russian news articles. University coursework.☆18Jan 21, 2019Updated 7 years ago
- Bluetooth Indoor Positioning with DNNs☆13Mar 28, 2022Updated 4 years ago
- 基于CNN的新浪新闻文本分类☆11Jul 22, 2019Updated 6 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Testing the performance of CNN and BERT embeddings on GLUE tasks☆15Mar 24, 2023Updated 3 years ago
- ☆14Mar 9, 2025Updated last year