Modern water distribution systems rely on computers, sensors and actuators for both monitoring and operational purposes. This combination of physical processes and embedded systems—cyber-physical systems, in short—improves the level of service of water distribution networks but exposes them to the potential threats of cyber attacks. We will be u…
☆21Jan 2, 2019Updated 7 years ago
Alternatives and similar repositories for Cyber-Attack-Prediction
Users that are interested in Cyber-Attack-Prediction are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Face detection using Open CV☆27Oct 29, 2019Updated 6 years ago
- The project is based on the automated attendance system. It takes into consideration that with increase in batch sizes of university and …☆14Sep 25, 2020Updated 5 years ago
- Identify a voice as male or female.☆33Mar 17, 2017Updated 9 years ago
- Prototype implementations of the orders 2 and 4 of the Runge-Kutta method in C++, CUDA and OpenCL applied to vector fields.☆18Jan 10, 2017Updated 9 years ago
- This repository contains the coding aspect of the project Leakage Detection in Smart Water Distribution Systems, where the collected data…☆11Jul 22, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆13Aug 29, 2021Updated 4 years ago
- Skeleton tracking - 3D Human Pose Estimation - Biomechanics - Depth Camera - Drone - Cubemos - Intel☆11Sep 4, 2021Updated 4 years ago
- A tool to simulate superconducting circuits, comparable to SPICE.☆12Jan 7, 2018Updated 8 years ago
- epanetCPA is a MATLAB® toolbox for assessing the impacts of cyber-physical attacks on water distribution systems☆23Oct 7, 2020Updated 5 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- The Berkeley JSIM superconducting spice simulator☆14Sep 20, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Sign Language Recognition using Gait Energy Image☆14Jan 7, 2022Updated 4 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 9 months ago
- [CVPRW 2023] Official repository of "Digital Twin Tracking Dataset (DTTD): A New RGB+Depth 3D Dataset for Longer-Range Object Tracking Ap…☆24Nov 22, 2024Updated last year
- Surface water quality data analysis and prediction of Potomac River, West Virginia, USA. Using time series forecasting, and anomaly detec…☆20Jun 6, 2020Updated 5 years ago
- Term 1 Project 3 Design a Sign Language Recognition System by Luke Schoen for Udacity Artificial Intelligence Nanodegree (AIND)☆13May 2, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Data for the paper "A Dataset for Learning University STEM Courses at Scale" by Zhang et al., 2022.☆15Nov 22, 2022Updated 3 years ago
- PyTorch implementation of RIC for conveyor systems with Deep Q-Networks (DQN) and Profit-Sharing (PS). Wang, T., Cheng, J., Yang, Y., Esp…☆14Jul 5, 2022Updated 3 years ago
- Digital Twin for Water Distribution Systems. A work by the SUTD Critical Infrastructure Systems Lab, TU Delft, CISPA, and iTrust☆63Sep 18, 2025Updated 8 months ago
- ☆11Dec 7, 2025Updated 5 months ago
- ☆14Jul 14, 2018Updated 7 years ago
- This repository contains the codes for computing geometrical digital twins as LOD3 models for buildings using a structure from motion and…☆24Feb 27, 2026Updated 2 months ago
- In this bachelorproject we explore the viability of using drones and rgb-d camera in 3d reconstruction.☆11Mar 26, 2018Updated 8 years ago
- Reinforcement Learning for Supply Chain Optimization☆15Feb 3, 2020Updated 6 years ago
- Create Data Mesh. Use interoperable digital twins to create data interactions and build powerful real-time data products. This repository…☆16Sep 24, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 4 years ago
- This is the source code for the paper entitled "CoCMA: Energy-Efficient Coverage Control in Cluster-Based Wireless Sensor Networks Using …☆24Aug 16, 2016Updated 9 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆11Nov 19, 2024Updated last year
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Repo for the paper publishing the superconductor database with 3D crystal structures.☆26Nov 21, 2024Updated last year
- Superconductors material dataset☆27Dec 5, 2023Updated 2 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago