luigiluz / automotive-ids-evaluation-frameworkView external linksLinks
☆14Jul 22, 2024Updated last year
Alternatives and similar repositories for automotive-ids-evaluation-framework
Users that are interested in automotive-ids-evaluation-framework are comparing it to the libraries listed below
Sorting:
- ☆16Jul 15, 2022Updated 3 years ago
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆19Jun 19, 2025Updated 7 months ago
- Word2Vec embeddings over packet capture data n-grams.☆20Mar 24, 2023Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Python3 based generator for SOME/IP packets☆24Jan 30, 2017Updated 9 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Repositório oficial da disciplina de Criatividade Computacional do CIn/UFPE☆12Jul 5, 2025Updated 7 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- ☆14Apr 1, 2025Updated 10 months ago
- Used for hardware trojan detection(Based on Trust_Hub)☆10Jul 30, 2019Updated 6 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆14Oct 17, 2024Updated last year
- Tire uma foto do gabarito de cada estudante e obtenha a correção de maneira automática☆10Mar 31, 2023Updated 2 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆19Sep 9, 2025Updated 5 months ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆14Jan 22, 2025Updated last year
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Cervical cancer is the second most common type of cancer that is found in the women worldwide. Generally, cancer caused due to irregular …☆10Mar 24, 2019Updated 6 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- Control your Canon Camera wirelessly with Cine Remote's easy-to-use interface.☆67Mar 3, 2025Updated 11 months ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- ☆10May 26, 2024Updated last year
- 多媒体立体防护平台☆13May 22, 2025Updated 8 months ago