This project will list the publicly available datasets in IoT domain and other resources that are required to do research in IoT domain
☆32Oct 10, 2024Updated last year
Alternatives and similar repositories for IoT-Related-Dataset-and-Resources
Users that are interested in IoT-Related-Dataset-and-Resources are comparing it to the libraries listed below
Sorting:
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆11Feb 21, 2022Updated 4 years ago
- ☆19Nov 21, 2023Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- A research project of anomaly detection on dataset IoT-23☆108Feb 22, 2026Updated 2 weeks ago
- IoT Attack Detection with machine learning☆30Jun 12, 2025Updated 8 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Jun 12, 2025Updated 8 months ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- A repository featuring practical data analysis projects using Pandas, demonstrating data manipulation, visualization, and real-world prob…☆20Jan 17, 2025Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ☆11Feb 21, 2025Updated last year
- ☆13Jun 4, 2020Updated 5 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- Finance strategy algorithms powered with AI to analyze financial market data, make predictions, and execute trades in real-time.☆12Aug 2, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Data files of promoter and non-promoter sequences used to build CNN models☆13Dec 24, 2016Updated 9 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Predict and prevent customer churn in the telecom industry with our advanced analytics and Machine Learning project. Uncover key factors …☆20Aug 16, 2025Updated 6 months ago
- CS234 Project, Winter 2019☆10Mar 20, 2019Updated 6 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- A website with many resources to help you learn Latin!☆15Dec 8, 2025Updated 3 months ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- Marketing is crucial for the growth and sustainability of retail business. Marketers can help build the company’s brand, engage customer…☆10Oct 29, 2021Updated 4 years ago
- ☆10May 26, 2024Updated last year
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- ☆10Sep 14, 2020Updated 5 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- An efficient method for sampling from the Gram--Schmidt Walk Design.☆13Sep 16, 2023Updated 2 years ago
- ☆13Dec 5, 2022Updated 3 years ago