Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Network models, MERN web I/O System.
☆20Feb 26, 2024Updated 2 years ago
Alternatives and similar repositories for NIDS
Users that are interested in NIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Course Material for the Tutorial on Privacy Enhancing Technologies and PPML☆13Oct 29, 2021Updated 4 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- This project aims to minimize the police response time by detecting weapons through a live CCTV camera feed. So it alerts the police as s…☆17Feb 6, 2021Updated 5 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆31Jun 29, 2023Updated 2 years ago
- ☆12Dec 11, 2020Updated 5 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆23May 10, 2024Updated last year
- 脱敏的毕业设计——网络安全课程实验仿真系统☆13May 19, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ☆14Jul 11, 2023Updated 2 years ago
- Machine learning based Intrusion detection system (IDS)☆66Jan 4, 2022Updated 4 years ago
- We provide a friendly foundational platform for beginners who intend to start Federated Learning (FL)☆20May 26, 2025Updated 11 months ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆62Oct 31, 2025Updated 6 months ago
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆155Jul 19, 2025Updated 9 months ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- ☆15Dec 7, 2023Updated 2 years ago
- Export the articles and reports from Google Scholar easily! (The spider structure is inspired by the Scrapy framework)☆12Nov 10, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Android demo client for thingsboard.☆11Apr 10, 2019Updated 7 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 5 months ago
- 漫画网站爬虫☆10Jan 9, 2025Updated last year
- Machine Learning-based tool for Cybersecurity Risk Assessment☆13Jul 18, 2021Updated 4 years ago
- 基于Django的网络安全事件应急响应与处置系统☆13Feb 11, 2025Updated last year
- Datasets for cybersecurity☆18Aug 12, 2025Updated 8 months ago
- A Low-Impact Internal Latency Measurement Tool for OpenAirInterface☆13Sep 13, 2023Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- Advanced MITM Tool☆13Jul 27, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Device-side implementation of the PTP (Picture Transfer Protocol) or PIMA-15740 standard for Linux☆16Jun 3, 2021Updated 4 years ago
- PyTorch implementation of OFDM building blocks for experimenting with PlutoSDR for over the air transmissions. AIML experiments for PHY-p…☆20Sep 16, 2025Updated 7 months ago
- ☆42Jul 20, 2024Updated last year
- 一个基于区块链的存储系统,可以在多个节点(设备)中,为用户生成非对称加密的公私钥对,并使用此密钥对,对数据进行加密上传,和解密下载。☆14Nov 16, 2022Updated 3 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- utility for sysmocom SIM card products; read-only mirror of https://gitea.sysmocom.de/sysmocom/sysmo-usim-tool☆24Jan 25, 2026Updated 3 months ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago