renj-xu / NEGSCView external linksLinks
NEGSC
☆47May 30, 2024Updated last year
Alternatives and similar repositories for NEGSC
Users that are interested in NEGSC are comparing it to the libraries listed below
Sorting:
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- A PyTorch implementation of of Anomal-E.☆41Dec 16, 2022Updated 3 years ago
- A PyTorch implementation of of E-GraphSAGE.☆102Jun 30, 2022Updated 3 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Mar 2, 2024Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆122Jan 8, 2025Updated last year
- Journal Article: Telematics and Informatics Reports☆11Jun 18, 2023Updated 2 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Apr 4, 2025Updated 10 months ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆24Nov 16, 2023Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- ☆99Nov 25, 2023Updated 2 years ago
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆19Apr 18, 2023Updated 2 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆60Dec 7, 2025Updated 2 months ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆17Feb 19, 2025Updated 11 months ago
- ☆10Mar 7, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- ☆10Mar 11, 2023Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated last year
- IoT Attack Detection with machine learning☆29Jun 12, 2025Updated 8 months ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Jun 12, 2025Updated 8 months ago
- ☆53Nov 11, 2021Updated 4 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated last year
- Pysharkfeat is a TLS encrypted traffic feature extraction tool from pcaps written in Python by using Wireshark's command line tshark.☆14Jul 1, 2022Updated 3 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Feb 2, 2023Updated 3 years ago
- Source Code for Graph Anomaly Detection with Unsupervised GNNs (ICDM2022)☆12Oct 18, 2022Updated 3 years ago
- ☆77Aug 31, 2025Updated 5 months ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Jul 12, 2024Updated last year
- ☆20Jul 10, 2024Updated last year
- ☆23Aug 8, 2022Updated 3 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆19May 10, 2023Updated 2 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago