Tag Generation and Text Generation Inference for Network Packets using Transformers
☆11Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for nids-transformers
Users that are interested in nids-transformers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆30Aug 2, 2023Updated 2 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- A GPT-2-class language model trained from scratch on OpenWebText with the intent to augment AI Transformer-model education and reverse en…☆24Mar 4, 2026Updated 3 weeks ago
- [NeurIPS'24] MemVLT: Vision-Language Tracking with Adaptive Memory-based Prompts☆19Oct 7, 2024Updated last year
- An IPython notebook analysis of the UWC Tampines commercial building dataset☆13Apr 25, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- sopacker是一个用于打包可执行文件和动态库的脚本工程. 生成的新可执行文件可以在大部分Linux上运行. sopacker is a script for packaging an executable file and all its dependent dynam…☆16Nov 14, 2025Updated 4 months ago
- smartsync service is in charge of correlating learning data from multiple agent instances and delivering a unified learning model for eac…☆17Mar 17, 2026Updated last week
- 招聘系统☆10Jun 7, 2017Updated 8 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- ☆20Aug 9, 2024Updated last year
- "A wonderful fact to reflect upon, that every human creature is constituted to be that profound secret and mystery to every other." ― Ch…☆45May 13, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 课程评价网站☆19Jun 2, 2025Updated 9 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆17Jun 18, 2024Updated last year
- A PyTorch implementation of "Can Large Language Models Improve the Adversarial Robustness of Graph Neural Networks?" (KDD 2025)☆29Nov 6, 2025Updated 4 months ago
- ☆40Sep 11, 2019Updated 6 years ago
- This is a Python version of CICFlowmeter-V4.0.☆18Mar 12, 2024Updated 2 years ago
- ☆22May 18, 2019Updated 6 years ago
- Implementation for data driven prediction of battery cycle life before capacity degradation☆14Apr 16, 2021Updated 4 years ago
- A Deep Learning approach toward creating a NIDS using python☆25Aug 8, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Dynamic Key-Value Memory Networks for Knowledge Tracing☆23Mar 28, 2018Updated 7 years ago
- This is a repository to store my csdn blogs.☆23Aug 8, 2018Updated 7 years ago
- Apprentices in Federated Learning from ECNU <3☆25Mar 10, 2022Updated 4 years ago
- This is an open source Snort rules repository☆30May 31, 2022Updated 3 years ago
- ☆34Oct 10, 2018Updated 7 years ago
- XQUIC-based rl cc framework☆26Nov 11, 2025Updated 4 months ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- This example project allows you to create a card based scroll layout, i.e developed using collection view flow layout. Enjoy !☆19Jan 18, 2018Updated 8 years ago
- ☆70Nov 13, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆18May 13, 2019Updated 6 years ago
- Speed up Transformers With Spectrum-Preserving Token Merging☆54Feb 9, 2025Updated last year
- Apriori算法实例-挖掘电影导演的关联规则☆44Dec 19, 2024Updated last year
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago