Use Introduction
☆21Aug 4, 2019Updated 6 years ago
Alternatives and similar repositories for How-to-process-KDD-99-dataset
Users that are interested in How-to-process-KDD-99-dataset are comparing it to the libraries listed below
Sorting:
- Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn☆59Apr 1, 2017Updated 8 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 6 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Evolutionary decision trees☆11Jun 16, 2025Updated 8 months ago
- 短链接服务器,基于proactor的多线程服务器,maysql作为发号器,redis缓存☆10Jun 2, 2021Updated 4 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- ☆12Oct 17, 2022Updated 3 years ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- Mirror of the OPNFV Fuel Project☆12Sep 8, 2023Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- DuBE: Duple-balanced Ensemble Learning from Skewed Data☆11Oct 31, 2022Updated 3 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- ☆11Oct 21, 2019Updated 6 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- This repo supports integrating LLMs and communication algorithms with MARL using SMAC as the platform. It provides an end-to-end workflow…☆16Mar 8, 2025Updated last year
- ☆14Mar 13, 2017Updated 8 years ago
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆11Jan 2, 2025Updated last year
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Genetic Algorithm Particle Swarm Optimization Implemented in Python☆16Oct 29, 2018Updated 7 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- 基于SDN架构的网络流量监控和控制☆12Feb 2, 2026Updated last month
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Jul 11, 2021Updated 4 years ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆21Aug 28, 2025Updated 6 months ago
- ☆14Oct 28, 2020Updated 5 years ago
- ☆16Oct 10, 2022Updated 3 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- A new framework to generate interpretable classification rules☆18Feb 11, 2023Updated 3 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆15Jan 16, 2023Updated 3 years ago
- Named Entity Recognition implemented by PyTorch including BiLSTM and BiLSCTM+CRF☆13Apr 20, 2020Updated 5 years ago
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- 基于宝塔面板的ZFaka一键安装脚本,本人博客☆15Jun 18, 2019Updated 6 years ago
- ☆15Mar 24, 2023Updated 2 years ago
- In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches☆16Jan 27, 2024Updated 2 years ago
- 机器学习竞赛代码☆15Oct 24, 2016Updated 9 years ago