Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer
☆11Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for Denseformer
Users that are interested in Denseformer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated 11 months ago
- wx☆11Aug 14, 2022Updated 3 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆14Aug 28, 2024Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Sep 10, 2024Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆28Feb 23, 2026Updated last month
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- 用python手写神经网络模型☆11Apr 9, 2019Updated 6 years ago
- ☆100Nov 25, 2023Updated 2 years ago
- ☆11Apr 4, 2022Updated 3 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a deterministic Tensorflow 2.0 (keras) implementation of a Open Ai's proximal policy optimization actor critic algorithm PPO.☆12Sep 3, 2020Updated 5 years ago
- This is a static version of ACN-Data (https://ev.caltech.edu/dataset), collected from three sites from 2018 to 2020.☆19Aug 8, 2024Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- python手写,不使用现有框架,实现全连接BP神经网络,并利用其在MNIST数据集上完成手写数字识别任务☆13Apr 11, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- Contains codes for our paper titled ''Joint Learning for Spatial Context-based Seismic Inversion of Multiple Datasets for Improved Genera…☆12Apr 9, 2021Updated 4 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- The goal of this repository is to help introductory programming students understand objects, inheritance, polymorphism and compiling java…☆33Apr 1, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- NILM (Non-intrusive Load Monitoring) 实验代码与结果 本仓库包含使用深度学习模型(LSTM、RNN 和 MultiHead Transformer)进行非侵入式负荷检测的代码和实验结果。NILM 技术用于从总负荷数据中提取各个电器的用电信…☆17Oct 21, 2024Updated last year
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆52Aug 10, 2020Updated 5 years ago
- 个人笔记☆18Apr 1, 2022Updated 3 years ago
- Documentation or supporting materials of Viking team's public sharing sessions☆12Aug 26, 2023Updated 2 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆81Jun 9, 2025Updated 9 months ago
- pytorch 使用AlexNet 实现猫狗二分类☆17May 26, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆19Aug 10, 2023Updated 2 years ago
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking☆18Jun 6, 2024Updated last year
- 基于联邦学习和深度残差网络的sdn入侵检测研究☆18Jun 17, 2024Updated last year
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- ☆11Nov 21, 2022Updated 3 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆51Sep 20, 2024Updated last year
- Implementation of a client reputation, gradient checking and homomorphic encryption mechanism to defend a federated learning system from …☆17Jan 11, 2024Updated 2 years ago