A Real-Time Network Intrusion Detection System based on Transformer-LSTM model (Major Project)
☆16May 27, 2024Updated last year
Alternatives and similar repositories for A-Real-Time-NIDS-based-on-Transformer-LSTM-model
Users that are interested in A-Real-Time-NIDS-based-on-Transformer-LSTM-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆38Mar 3, 2023Updated 3 years ago
- ☆104Nov 25, 2023Updated 2 years ago
- ☆19Jan 2, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆41Apr 17, 2025Updated last year
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 11 months ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 8 months ago
- Load Tensorflow pb file using Bert/TextCNNs, an ensemble model using Java.☆10Aug 20, 2021Updated 4 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆15Aug 28, 2024Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆25Dec 24, 2021Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆19Aug 10, 2023Updated 2 years ago
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking☆18Jun 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆24May 24, 2025Updated 11 months ago
- ☆20Jan 20, 2021Updated 5 years ago
- a lightweight tool to analyse h264 and h265 raw stream.☆11Nov 13, 2024Updated last year
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- ☆14May 1, 2023Updated 3 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- Go implementation of the Model Context Protocol (MCP) with comprehensive Streamable HTTP, STDIO, and SSE support.☆59Apr 28, 2026Updated 3 weeks ago
- Implementation, Comparison of KCF(Kernelized Correlation Filter) and DL methods for single object tracking☆15Dec 9, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BARE-METAL Example of the FatFs running on the SDMMC of the STM32F746G-DISCO No HAL at all... full bare-metal☆12Jun 22, 2018Updated 7 years ago
- 使用django对情感分析功能进行封装,里面包含使用情感词典和Bert模型进行情感分类,最后可以使用tensorFlow serving将模型部署在docker中运行。☆12Sep 23, 2019Updated 6 years ago
- Provides an ensemble model to deploy a YOLOv8 TensorRT model to Triton☆13Mar 28, 2024Updated 2 years ago
- Pytorch implementation of UTRAD☆29Apr 23, 2022Updated 4 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 3 years ago
- [TMM] Fusion-Mamba for Cross-modality Object Detection.☆68Oct 21, 2025Updated 7 months ago
- ☆20Feb 3, 2021Updated 5 years ago
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆51May 12, 2026Updated last week
- Network System Intrusion Detection using Graph Neural Networks☆23Aug 1, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Classification and aggregation of russian news articles. University coursework.☆18Jan 21, 2019Updated 7 years ago
- Bluetooth Indoor Positioning with DNNs☆13Mar 28, 2022Updated 4 years ago
- 基于CNN的新浪新闻文本分类☆11Jul 22, 2019Updated 6 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago
- Testing the performance of CNN and BERT embeddings on GLUE tasks☆15Mar 24, 2023Updated 3 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- ☆14Mar 9, 2025Updated last year