NSL KDD binary classification with Transformer
☆10Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for NSL-KDD-binary-classification-with-Transformer
Users that are interested in NSL-KDD-binary-classification-with-Transformer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于libevent框架的简易日志管理系统☆16Apr 3, 2019Updated 7 years ago
- ☆11Apr 4, 2022Updated 4 years ago
- FL-based intrusion detection system development using model averaging.☆45Dec 18, 2022Updated 3 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Nov 18, 2022Updated 3 years ago
- A Behavior-Based Device Identification Method for the IoT☆61Feb 25, 2025Updated last year
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆32Dec 26, 2019Updated 6 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- Pytorch implementation of UTRAD☆29Apr 23, 2022Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆29Nov 6, 2022Updated 3 years ago
- The conference that comes together while you sleep.☆17Feb 12, 2021Updated 5 years ago
- Template for Compose KMP project☆16Nov 25, 2023Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- ☆17Nov 16, 2023Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- IoT Attack Detection with machine learning☆31Jun 12, 2025Updated 10 months ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- ☆19Feb 17, 2021Updated 5 years ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago