Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Flower framework.
☆16Apr 29, 2024Updated 2 years ago
Alternatives and similar repositories for simple_ids_with_flwr_iec104
Users that are interested in simple_ids_with_flwr_iec104 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Feb 5, 2025Updated last year
- wx☆11Aug 14, 2022Updated 3 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing☆17Jan 12, 2022Updated 4 years ago
- ☆47Dec 25, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Master of Data Science Project☆17Nov 26, 2024Updated last year
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- Face Verification Example with Flower / Federated Learning☆12Apr 3, 2023Updated 3 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- 使用K-Nearest Neighbors进行DoS / DDoS检测:☆10Mar 21, 2019Updated 7 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆205Apr 20, 2026Updated 2 weeks ago
- An implementation of pneumonia medical X-ray image classification problem using Federated Learning in PySyft.☆13Jun 16, 2019Updated 6 years ago
- Official source code of the paper: Perturbation Seeking Generative Adversarial Networks: A Defense Framework for Remote Sensing Image Sce…☆14Jan 6, 2022Updated 4 years ago
- A Simple python script for detection Potential DDoS Attacks☆13Feb 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Using WoLF (win or learn fast) PHC (policy hill climbing) algorithm to implement stochastic games☆15Jun 14, 2019Updated 6 years ago
- ☆11Nov 21, 2022Updated 3 years ago
- Experiments of the DAI in Healthcare project - skin lesions images use case - using Flower☆12Jun 16, 2022Updated 3 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆14Dec 23, 2023Updated 2 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- 基于联邦学习和深度残差网络的sdn入侵检测研究☆18Jun 17, 2024Updated last year
- FL-based intrusion detection system development using model averaging.☆45Dec 18, 2022Updated 3 years ago
- ☆19Mar 18, 2021Updated 5 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This project will list the publicly available datasets in IoT domain and other resources that are required to do research in IoT domain☆32Oct 10, 2024Updated last year
- DDOS and Bruteforce prevention and notifications☆18Aug 14, 2023Updated 2 years ago
- Repo for Machine Learning Models for Renewable Energy Forecasting Research Paper (DOI: 10.1080/09720510.2020.1721636)☆14Jan 9, 2021Updated 5 years ago
- CICIDS2017 dataset☆70Jan 4, 2022Updated 4 years ago
- As we know that Now-a-days Most of the DDos attacks are often sourced from Cloud and Affect many systems and businesses, resulting in s…☆13Aug 28, 2023Updated 2 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 5 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆14Jul 10, 2024Updated last year
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- t-sne vizualization python implementation☆12Oct 21, 2016Updated 9 years ago
- The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algori…☆11Oct 19, 2021Updated 4 years ago
- Code for novel methods for one-shot Federated Learning under high statistical heterogeneity.☆18Oct 2, 2023Updated 2 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 3 years ago
- A research project of anomaly detection on dataset IoT-23☆111Feb 22, 2026Updated 2 months ago
- TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation☆21Jan 31, 2022Updated 4 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago