Playing around with IDS data in Keras
☆13Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for DeepIDS
Users that are interested in DeepIDS are comparing it to the libraries listed below
Sorting:
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 9 years ago
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- The Cape Privacy Python SDK☆24Oct 5, 2023Updated 2 years ago
- Brink is a domain specific language for linking and composing binary files.☆12Jul 6, 2021Updated 4 years ago
- Virtual network manager - Manages containers and VMs to create a virtual network setup☆12May 12, 2024Updated last year
- The original Protocol-oblivious Forwarding (POF) switch by Huawei☆10Sep 1, 2016Updated 9 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- D3 Force Layout demo written in React and TypeScript☆11Dec 8, 2017Updated 8 years ago
- Optimization as a service TUI☆11Mar 11, 2024Updated last year
- A flat container abstraction for Rust☆16Nov 24, 2025Updated 3 months ago
- Minimal (truly) muP implementation, consistent with TP4 and TP5 papers notation☆14Jan 2, 2026Updated last month
- The Hybrid Public Key Encryption (HPKE) standard in Python☆12Apr 29, 2024Updated last year
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- ICE detention dashboard☆19Updated this week
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- ☆15Aug 26, 2022Updated 3 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- ☆11Nov 29, 2019Updated 6 years ago
- Code for Dynamic Pricing for Non-fungible Resources☆17Oct 31, 2022Updated 3 years ago
- Checks whether a TLS connection uses SHA1 signed certificates, and if Google Chrome approves.☆17Jul 22, 2015Updated 10 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- Make quick and dirty data mining made easier in Sublime Text☆11Feb 24, 2021Updated 5 years ago
- Bitpart is a messaging tool that runs on top of Signal to support activists, journalists, and human rights defenders.☆31Feb 21, 2026Updated last week
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- NAT probing toolkit.☆22Jan 12, 2020Updated 6 years ago
- Acoustic fingerprinting in Go.☆17Aug 3, 2014Updated 11 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- MIDI-to-vector encoding, sequence learning & generation.☆14Jul 23, 2018Updated 7 years ago
- An easy, modularized, DIY Federated Learning framework with many baselines for individual researchers.☆17May 24, 2023Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆21Apr 17, 2025Updated 10 months ago
- 得力e+APP打卡时间统计助手,用于统计截止使用时刻,当周还需多少打卡时间☆12May 7, 2024Updated last year
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Dec 27, 2022Updated 3 years ago
- ☆32Dec 5, 2025Updated 2 months ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- suricata eve.json parser in Go☆15May 16, 2019Updated 6 years ago
- Module for Qubes OS to integrate Yubikey authentication through a USB VM☆19Feb 24, 2018Updated 8 years ago
- Online Federated Learning.☆16Apr 26, 2021Updated 4 years ago