kahramankostas / NSL-KDD-binary-classification-with-TransformerView external linksLinks
NSL KDD binary classification with Transformer
☆10Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for NSL-KDD-binary-classification-with-Transformer
Users that are interested in NSL-KDD-binary-classification-with-Transformer are comparing it to the libraries listed below
Sorting:
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- ☆11Apr 4, 2022Updated 3 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- FL-based intrusion detection system development using model averaging.☆42Dec 18, 2022Updated 3 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- This is a CNN model for prediction of cyber attack, trained using NSL-KDD dataset☆10Mar 7, 2024Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- The Social Network System Database Design in MySQL to manage the Users, Friends, Follower, Messages, and Groups.☆13Nov 1, 2020Updated 5 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- The conference that comes together while you sleep.☆17Feb 12, 2021Updated 5 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated last year
- ☆16Nov 18, 2022Updated 3 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- 基于libevent框架的简易日志管理系统☆16Apr 3, 2019Updated 6 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- A Behavior-Based Device Identification Method for the IoT☆58Feb 25, 2025Updated 11 months ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆18Sep 21, 2020Updated 5 years ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- Some personal work on DARPA TC engagement5☆20Aug 7, 2023Updated 2 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- Template for Compose KMP project☆16Nov 25, 2023Updated 2 years ago
- ☆17Nov 16, 2023Updated 2 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- My Linux Dotfiles☆16Sep 6, 2025Updated 5 months ago
- The SEPSES Cyber-KB Engine☆26Nov 27, 2024Updated last year