Reproduction of "Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks"
☆13May 30, 2021Updated 4 years ago
Alternatives and similar repositories for entropy_CAN_IDS
Users that are interested in entropy_CAN_IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 5 years ago
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- GAN_based_Intrusion_Detection_System_for_in-vehicle_network☆17Dec 3, 2024Updated last year
- ☆16Dec 29, 2022Updated 3 years ago
- ☆16Jul 15, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated last year
- An intelligent classifier based Intrusion Detection System for IoV’s based on Neural Networks like optimized CNN, transfer learning and e…☆18May 19, 2022Updated 3 years ago
- LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection (arXiv:2311.08000v2)☆25Nov 22, 2025Updated 4 months ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 6 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- ☆17Mar 25, 2024Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- ☆14Jul 22, 2024Updated last year
- Cervical cancer is the second most common type of cancer that is found in the women worldwide. Generally, cancer caused due to irregular …☆10Mar 24, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Oct 16, 2021Updated 4 years ago
- denosing for dirty document image☆13May 20, 2019Updated 6 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- ☆17Jun 8, 2017Updated 8 years ago
- Classifying network traffic using machine learning approach☆24Jul 5, 2020Updated 5 years ago
- Source code of BI-Mamba for cardiovascular disease detection from two-view chest X-rays☆14Dec 10, 2025Updated 4 months ago
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆15Mar 27, 2024Updated 2 years ago
- A framework for creating and benchmarking configurable Particle Swarm Optimization, Differential Evolution and hybrid PSODE algorithms as…☆11May 6, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Nov 2, 2021Updated 4 years ago
- ☆22Aug 1, 2019Updated 6 years ago
- CoSaMP algorithm in Python language for sparse recovery problems.☆10Jan 14, 2022Updated 4 years ago
- Docker image for NS-3 Network Simulator v.3.30☆13Apr 11, 2021Updated 5 years ago
- Security Analytics Engine - Anomaly Detection in Web Traffic☆31Sep 18, 2025Updated 7 months ago
- Network-wide heavy hitter detection in P4☆13Apr 1, 2020Updated 6 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- ☆11Oct 25, 2023Updated 2 years ago
- 这是一个二分类的决策树系统,用于识别一个网站是否为钓鱼网站☆13Feb 18, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 设计过度的SAE J1939 protocol☆18Sep 26, 2025Updated 6 months ago
- A fast MATLAB implementation of the Weisfeiler--Lehman graph transformation and associated kernel.☆11Oct 25, 2017Updated 8 years ago
- Docker containers that run DPDK on ubuntu, rockylinux and rhel etc host machines.☆13Jul 10, 2025Updated 9 months ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- ☆14Sep 1, 2022Updated 3 years ago
- ☆34Nov 4, 2025Updated 5 months ago
- Data of paper "CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer"☆14Jan 11, 2021Updated 5 years ago