Coburg Intrusion Detection Data Sets
☆51Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for CIDDS
Users that are interested in CIDDS are comparing it to the libraries listed below
Sorting:
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆675Dec 4, 2023Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- This repository introduces the NICT Darknet Dataset 2022 https://csdataset.nict.go.jp/darknet-2022/☆11Sep 29, 2023Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- D-ITG, Distributed Internet Traffic Generator☆33May 4, 2024Updated last year
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- ☆14Aug 7, 2025Updated 6 months ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- This is the Android device configuration for Sony Xperia XZ1 Compact (yoshino platform).☆10May 30, 2025Updated 9 months ago
- Optimize with SigOpt with this standalone SigOpt client driver.☆12Updated this week
- Plagiarism checker plugin for OJS 3/OMP☆14Updated this week
- ☆11Feb 14, 2023Updated 3 years ago
- Postgres + Clickhouse = The default data stack.☆33Feb 19, 2026Updated 2 weeks ago
- ☆11Jul 25, 2023Updated 2 years ago
- The work in paper "An AI-based Traffic Matrix Prediction Solution for Software-Defined Network" - Duc-Huy LE, Hai Anh TRAN, Sami SOUIHI, …☆45Oct 21, 2021Updated 4 years ago
- ☆13Nov 12, 2024Updated last year
- A solution to integrate a remote Langgraph server with Open-Webui Pipelines☆19Sep 7, 2025Updated 5 months ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- the server backend for ml-dash☆10Apr 21, 2025Updated 10 months ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- [IEEE JBHI] The official code for "Automatic Segmentation of Hemorrhages in the Ultra-wide Field Retina: Multi-scale Attention Subtractio…☆15Feb 25, 2025Updated last year
- A passkeys demo using Spring Boot and Auth0 as IdP☆14Jan 29, 2024Updated 2 years ago
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- ☆11Sep 30, 2017Updated 8 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Tutorial about Artificial Intelligence, Machine Learning and Deep Learning☆12Aug 9, 2019Updated 6 years ago
- LibML is a library for loading, configuring, and running machine learning models in production. It provides a simple high-level API for C…☆13Mar 14, 2025Updated 11 months ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- ☆13Apr 13, 2021Updated 4 years ago
- This repository contains sample agentic applications in python that can talk to LLM models and perform complex tasks based on user querie…☆16Mar 3, 2025Updated last year
- Learn Kyo with simple exercises!☆13Aug 25, 2025Updated 6 months ago
- Windows desktop application for control of SD-OCT imaging systems☆11Oct 20, 2025Updated 4 months ago
- A work-in-progress ION SFU remake.☆21Feb 21, 2026Updated last week
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- My talks☆10Dec 11, 2024Updated last year