A Behavior-Based Device Identification Method for the IoT
☆60Feb 25, 2025Updated last year
Alternatives and similar repositories for IoTDevIDv2
Users that are interested in IoTDevIDv2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Jun 10, 2022Updated 3 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- IoT Attack Detection with machine learning☆30Jun 12, 2025Updated 9 months ago
- IoT device type identification using machine learning techniques.☆40Aug 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- ☆19Mar 29, 2022Updated 4 years ago
- PyTrafficSim is a light traffic simulator for research related purposes. PTS is the most easy way to test your self-driving algorithm wit…☆20Mar 6, 2021Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆24Mar 11, 2022Updated 4 years ago
- CNN-LSTM-attention☆10Jan 6, 2021Updated 5 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- Iterative training on pseudo-labeled data experiment on the MNIST-dataset☆11Sep 3, 2024Updated last year
- ☆56Sep 6, 2023Updated 2 years ago
- ☆15Mar 19, 2025Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆32Aug 28, 2022Updated 3 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆72May 15, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆59Dec 5, 2019Updated 6 years ago
- 基于CNN+LSTM时空神经网络的在线流量分类模型☆16Jul 7, 2022Updated 3 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆30Feb 22, 2024Updated 2 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Implementation of seq2seq word-level model using keras☆12Dec 18, 2017Updated 8 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- ☆13Oct 3, 2022Updated 3 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- NEGSC☆47May 30, 2024Updated last year
- About the code release for "Federated PCA on Grassmann Manifold for IoT Anomaly Detection" ToN2024☆21May 28, 2025Updated 10 months ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆200Sep 8, 2021Updated 4 years ago
- A dataset repository of "Accurate Action Recommendation for Smart Home via Two-Level Encoders and Commonsense Knowledge" (CIKM 2022)☆16Aug 20, 2025Updated 7 months ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆238Nov 16, 2022Updated 3 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆52Mar 2, 2024Updated 2 years ago