Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Network models, MERN web I/O System.
☆20Feb 26, 2024Updated 2 years ago
Alternatives and similar repositories for NIDS
Users that are interested in NIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated last year
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- A collection of demos and utilities prepared ahead of the Vector Institute Privacy Enhancing Techniques (PETs) Bootcamp.☆15Sep 22, 2022Updated 3 years ago
- Repository containing notebooks that implement different Federated Learning algorithms using PyTorch☆12May 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Course Material for the Tutorial on Privacy Enhancing Technologies and PPML☆13Oct 29, 2021Updated 4 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- Official code for "Federated learning for heterogeneous electronic health record systems with cost effective participant selection"☆12Feb 11, 2026Updated 2 months ago
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆31Jun 29, 2023Updated 2 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- ☆12Dec 11, 2020Updated 5 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ☆14Jul 11, 2023Updated 2 years ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆60Oct 31, 2025Updated 5 months ago
- We provide a friendly foundational platform for beginners who intend to start Federated Learning (FL)☆20May 26, 2025Updated 10 months ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆39Jun 10, 2024Updated last year
- ☆15Dec 7, 2023Updated 2 years ago
- Export the articles and reports from Google Scholar easily! (The spider structure is inspired by the Scrapy framework)☆12Nov 10, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- Federated Reinforcement Learning project☆33Feb 26, 2023Updated 3 years ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆53Jul 1, 2024Updated last year
- Android demo client for thingsboard.☆11Apr 10, 2019Updated 7 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 5 months ago
- 机器学习作业,机器学习和深度学习方法实现入侵检测☆36Apr 19, 2022Updated 4 years ago
- Datasets for cybersecurity☆16Aug 12, 2025Updated 8 months ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Advanced MITM Tool☆13Jul 27, 2025Updated 8 months ago
- Device-side implementation of the PTP (Picture Transfer Protocol) or PIMA-15740 standard for Linux☆15Jun 3, 2021Updated 4 years ago
- PyTorch implementation of OFDM building blocks for experimenting with PlutoSDR for over the air transmissions. AIML experiments for PHY-p…☆18Sep 16, 2025Updated 7 months ago
- 一个基于区块链的存储系统,可以在多个节点(设备)中,为用户生成非对称加密的公私钥对,并使用此密钥对,对数据进行加密上传,和解密下载。☆14Nov 16, 2022Updated 3 years ago
- Machine Learning for Cyber Security☆30Dec 14, 2021Updated 4 years ago
- An ARP spoofing detection written in python using Scapy library, based on the paper "Detecting ARP Spoofing: An Active Technique" by Vive…☆16Apr 7, 2021Updated 5 years ago
- Containerized Kraken SDR applications☆18Feb 25, 2024Updated 2 years ago