Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆21Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for ics-anomaly-attribution
Users that are interested in ics-anomaly-attribution are comparing it to the libraries listed below
Sorting:
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆53Jan 22, 2026Updated last month
- ☆16Oct 23, 2019Updated 6 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 5 months ago
- A robotframework library that repairs failing Robot Framework tests automatically via AI☆22Feb 5, 2026Updated last month
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Real-Time Network Intrusion Detection Framework☆13Mar 21, 2025Updated 11 months ago
- UCI's first women-centric hackathon!☆11Updated this week
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Learn OpenCV : C++ and Python Examples☆10Mar 14, 2019Updated 6 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背 诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- anomalies detection approach☆13Dec 23, 2024Updated last year
- ☆12Jun 19, 2024Updated last year
- Governance UI Landing Page - realms.today☆12Feb 9, 2025Updated last year
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 5 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆14Feb 26, 2025Updated last year
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- ☆10May 29, 2024Updated last year
- ☆13Sep 23, 2024Updated last year
- IBM Quantum Challenge Fall 2023☆10May 23, 2023Updated 2 years ago
- ☆14Dec 22, 2015Updated 10 years ago
- ☆14Sep 29, 2021Updated 4 years ago
- ☆10Feb 10, 2020Updated 6 years ago
- TensorFlow,DCGAN,VAE,LSTM,CNN,Acoustic Scene Classification☆11Jun 5, 2019Updated 6 years ago
- ☆10May 22, 2020Updated 5 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Jan 12, 2016Updated 10 years ago
- Feature Importance Analysis of Models☆11Mar 23, 2022Updated 3 years ago
- ☆11Apr 23, 2024Updated last year
- A landing page with all info around Polkadot Technical Fellowship☆15Feb 16, 2026Updated 3 weeks ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆12Nov 29, 2024Updated last year
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- ☆13Aug 8, 2024Updated last year
- ☆13Nov 29, 2021Updated 4 years ago
- Contains source for detecting metal corrosion using Machine learning☆12Aug 28, 2024Updated last year
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year