shahroztariq / CANTransferLinks
CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network
☆13Updated 4 years ago
Alternatives and similar repositories for CANTransfer
Users that are interested in CANTransfer are comparing it to the libraries listed below
Sorting:
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆17Updated 3 weeks ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆34Updated 2 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆11Updated last year
- ☆20Updated 5 months ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- ☆21Updated 4 years ago
- Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.☆20Updated last year
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆16Updated last year
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Updated 4 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆22Updated 7 months ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- A Graph Neural Network-based Intrusion Detection System☆18Updated 11 months ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆44Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 3 years ago
- NEGSC☆37Updated last year
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- Anomaly Detection using PCA and BiGAN☆13Updated 4 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 5 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆12Updated last year
- ☆15Updated 2 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- This project is an open-source project based on a GAN network anomaly detection.☆13Updated 11 months ago
- ☆13Updated last year