This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection Systems paper.
☆17Aug 27, 2022Updated 3 years ago
Alternatives and similar repositories for t-dfnn
Users that are interested in t-dfnn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- ☆22Oct 22, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Jul 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- Intrusion Detection System for IoT Devices☆22Nov 23, 2022Updated 3 years ago
- Multi-scale Signed Recurrence Plot Based Time Series Classification Using Inception Architectural Networks☆10Jul 11, 2023Updated 2 years ago
- Official implementation of the paper "FedSIS: Federated Split Learning with Intermediate Representation Sampling for Privacy-preserving G…☆16Sep 5, 2023Updated 2 years ago
- ☆17Jan 6, 2022Updated 4 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆43Aug 15, 2023Updated 2 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- 王道课后习题代码☆10Nov 11, 2022Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- ☆18Feb 22, 2022Updated 4 years ago
- ☆16Dec 29, 2022Updated 3 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆24Aug 28, 2025Updated 6 months ago
- ☆19Feb 17, 2021Updated 5 years ago
- ☆41Jan 24, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 书籍、课程和文章汇总☆12Dec 14, 2022Updated 3 years ago
- ☆21Jul 12, 2022Updated 3 years ago
- ☆18May 9, 2024Updated last year
- ☆11Nov 26, 2019Updated 6 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago
- ☆39Nov 20, 2023Updated 2 years ago
- Datasets for cybersecurity☆16Aug 12, 2025Updated 7 months ago