jogecodes / transformerADLinks
Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"
☆33Updated 2 years ago
Alternatives and similar repositories for transformerAD
Users that are interested in transformerAD are comparing it to the libraries listed below
Sorting:
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆23Updated 10 months ago
- ☆87Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆34Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- ☆43Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆45Updated 9 months ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆47Updated 4 years ago
- Attention Model for Network Intrusion Detection☆17Updated 5 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆113Updated 2 years ago
- ☆9Updated 2 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆14Updated 7 months ago
- ☆20Updated 5 months ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆174Updated 2 years ago
- ☆15Updated 2 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆46Updated last year
- ☆19Updated 3 years ago
- manojkumar-github / Intrusion-Detection-System-for-IoT-networks-using-Gated-Recurrent-Neural-Networks-GRUAn Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Updated 7 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- ☆24Updated last year
- ☆19Updated 4 years ago
- Encrypted Network Traffic Classification using Deep Learning☆52Updated last year
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆87Updated 3 years ago