renj-xu / NEGSCLinks
NEGSC
☆37Updated last year
Alternatives and similar repositories for NEGSC
Users that are interested in NEGSC are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- ☆18Updated last year
- ☆48Updated 3 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆69Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆89Updated 2 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- ☆9Updated 2 years ago
- ☆13Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆14Updated 10 months ago
- ☆24Updated last year
- ☆42Updated 2 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated last year
- ☆12Updated 3 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- ☆18Updated 4 years ago
- ☆17Updated 11 months ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- ☆15Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆19Updated 2 months ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆34Updated 2 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- Network System Intrusion Detection using Graph Neural Networks☆16Updated last year
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆35Updated 4 years ago
- ☆22Updated 3 years ago