A Behavior-Based Device Identification Method for the IoT
☆61Feb 25, 2025Updated last year
Alternatives and similar repositories for IoTDevIDv2
Users that are interested in IoTDevIDv2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆29Nov 6, 2022Updated 3 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Jun 10, 2022Updated 3 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- IoT device type identification using machine learning techniques.☆40Aug 18, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- ☆22Sep 8, 2025Updated 7 months ago
- With recent advances in both Artificial Intelligence (AI) and Internet of Things (IoT) capabilities, it is more possible than ever to imp…☆16May 17, 2022Updated 3 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- ☆19Mar 29, 2022Updated 4 years ago
- PyTrafficSim is a light traffic simulator for research related purposes. PTS is the most easy way to test your self-driving algorithm wit…☆20Mar 6, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆18Oct 14, 2020Updated 5 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- ☆25Mar 11, 2022Updated 4 years ago
- 全国大学生信息安全竞赛作品赛参赛作品☆16Nov 15, 2024Updated last year
- CNN-LSTM-attention☆10Jan 6, 2021Updated 5 years ago
- Iterative training on pseudo-labeled data experiment on the MNIST-dataset☆11Sep 3, 2024Updated last year
- ☆56Sep 6, 2023Updated 2 years ago
- This projected explored the effect of introducing channel and spatial attention mechanisms, namely SEN-Net, ECA-Net, and CBAM to existin…☆11Jun 11, 2023Updated 2 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆72May 15, 2023Updated 2 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆58Dec 5, 2019Updated 6 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- 基于CNN+LSTM时空神经网络的在线流量分类模型☆16Jul 7, 2022Updated 3 years ago
- Mon(IoT)r Lab Testbed Software - Core Component☆13Aug 9, 2024Updated last year
- ☆10Jan 4, 2024Updated 2 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- Implementation of seq2seq word-level model using keras☆12Dec 18, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- 👀 An all-purpose eye tracking web application and API for Alzheimer's disease research (3 tasks, <3 mins). 1st place in the 2021 CNT hac…☆13Jun 17, 2021Updated 4 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- NEGSC☆47May 30, 2024Updated last year
- dataSet for kubAnomaly model☆19Mar 24, 2023Updated 3 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago