matthew-64 / Hydra2_Adversarial_NIDSView external linksLinks
As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring our safety from malicious actors trying to capitalise on this digitisation is becoming ever more important. One such system that was developed to defend against attacks is a Network Intrusion Detection System (…
☆10Oct 8, 2022Updated 3 years ago
Alternatives and similar repositories for Hydra2_Adversarial_NIDS
Users that are interested in Hydra2_Adversarial_NIDS are comparing it to the libraries listed below
Sorting:
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26May 8, 2020Updated 5 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆28Jan 6, 2020Updated 6 years ago
- Excel MCP Server - Manipulate Excel files without Microsoft Excel. Model Context Protocol for XLSX, XLSM with Claude AI integration☆22Jun 18, 2025Updated 7 months ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆43Dec 19, 2025Updated last month
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- ✓ Using scapy and nmap tools, find out ip/port, ARP SPOOFING & TCP SESSION HIJACKING ✓ Using snort tool provided Intrusion Detection Syst…☆10Oct 29, 2019Updated 6 years ago
- Package for word stress detection☆11Jan 27, 2023Updated 3 years ago
- Tutoriales sobre el uso de la API de twitter en PHP☆14Aug 19, 2014Updated 11 years ago
- Code for the NAACL 2024 HCI+NLP Workshop paper "LLMCheckup: Conversational Examination of Large Language Models via Interpretability Tool…☆13Mar 24, 2024Updated last year
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆10Oct 13, 2018Updated 7 years ago
- Hyperledger Fabric setup script on Kubernetes Cluster☆13Jun 2, 2022Updated 3 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- LibML is a library for loading, configuring, and running machine learning models in production. It provides a simple high-level API for C…☆12Mar 14, 2025Updated 11 months ago
- ☆15Nov 15, 2023Updated 2 years ago
- Simple Network Intrusion Detection System. In python with Scapy.☆38Jun 10, 2019Updated 6 years ago
- explainable-machine-translation-metrics☆12Jul 15, 2022Updated 3 years ago
- ☆11Jun 17, 2015Updated 10 years ago
- Windows Forms controls for audio spectrum visualization, etc. using NAudio.☆10Feb 15, 2021Updated 5 years ago
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- It automatically describes images in PDF files and generates questions from these descriptions. With its advanced RAG structure, it direc…☆12Jun 29, 2024Updated last year
- a collection of tools and python libraries for use in medical practice and research☆11Nov 22, 2025Updated 2 months ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Nov 7, 2019Updated 6 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Feb 27, 2025Updated 11 months ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- Building reliable Retrieval Augmented Generation(RAG) AI Architecture☆13Jul 30, 2024Updated last year
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- A System-Oriented Wargame Framework for Adversarial ML☆10Apr 24, 2023Updated 2 years ago
- Forecasting of forest drought impacts in Switzerland from satellite imagery, weather reanalysis and remote sensing data. Pixel-wise forec…☆15Sep 14, 2023Updated 2 years ago
- A graphical sound editor which uses CSCore library for reading and playing sound files.☆11Jul 27, 2016Updated 9 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- Airbnb price prediction using Machine Learning and Deep Learning☆18May 28, 2023Updated 2 years ago