NEGSC
☆47May 30, 2024Updated last year
Alternatives and similar repositories for NEGSC
Users that are interested in NEGSC are comparing it to the libraries listed below
Sorting:
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- A PyTorch implementation of of E-GraphSAGE.☆103Jun 30, 2022Updated 3 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆52Mar 2, 2024Updated 2 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆122Jan 8, 2025Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Feb 23, 2026Updated last week
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- ☆99Nov 25, 2023Updated 2 years ago
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 11 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆61Dec 7, 2025Updated 2 months ago
- ☆13Sep 23, 2024Updated last year
- ☆10Mar 7, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- IoT Attack Detection with machine learning☆30Jun 12, 2025Updated 8 months ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Jun 12, 2025Updated 8 months ago
- ☆53Nov 11, 2021Updated 4 years ago
- Pysharkfeat is a TLS encrypted traffic feature extraction tool from pcaps written in Python by using Wireshark's command line tshark.☆14Jul 1, 2022Updated 3 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- Source Code for Graph Anomaly Detection with Unsupervised GNNs (ICDM2022)☆12Oct 18, 2022Updated 3 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Feb 2, 2023Updated 3 years ago
- ☆76Aug 31, 2025Updated 6 months ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- ☆19Mar 18, 2021Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆19May 10, 2023Updated 2 years ago
- ☆20Jul 10, 2024Updated last year
- ☆23Aug 8, 2022Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago