Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
☆18May 10, 2023Updated 2 years ago
Alternatives and similar repositories for Deep-Learning-Evaluation-of-IDS-Datasets
Users that are interested in Deep-Learning-Evaluation-of-IDS-Datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆48Sep 24, 2022Updated 3 years ago
- ☆10Apr 30, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- improved by ACWGAN-gp☆10Feb 18, 2020Updated 6 years ago
- A fully featured platform that detect clothing size and continuously recommends clothing tailored to the user's liking☆10Aug 9, 2023Updated 2 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Apr 11, 2017Updated 9 years ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 9 months ago
- This project showcases a big data processing pipeline for cryptocurrency data using Hadoop, Spark Streaming, Kafka, MongoDB, and a React …☆14May 10, 2023Updated 2 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- By using python 3.6 and google recognizer and ffmpeg it will convert video file like mp4 to audio file like mp3 and also convert 3gp file…☆13Jan 30, 2019Updated 7 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- Engineered an advanced deep learning model to automate the classification of financial documents, including Balance Sheets, Cash Flow and…☆10Jul 19, 2024Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- IoT intrusion Detection Model based on neural network and random forests☆50Oct 16, 2018Updated 7 years ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 5 years ago
- Trust management model in IoT☆15Oct 11, 2021Updated 4 years ago
- Myntra 'HackerRamp: WeForShe' hackathon's pre-finale submission 'V-Shop' is a communicative web application which will facilitate the use…☆12Jan 17, 2022Updated 4 years ago
- ☆19Feb 5, 2025Updated last year
- ☆23Jan 4, 2021Updated 5 years ago
- My introduction project to the Ethereum Blockchain, Solidity, and Smart Contracts.☆17Sep 12, 2021Updated 4 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- ☆18Dec 31, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A trust inference model on the hyperledger that is attack proof for communication in ephemeral networks such as vehicular adhoc networks …☆18Sep 4, 2020Updated 5 years ago
- Detect and report Obscene contents on the Internet directly from your browser with Deep-Learning models.☆12Jul 13, 2023Updated 2 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆18Mar 12, 2025Updated last year
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- albert-fc for LP(Link Prediction),中文实体链接预测☆19Apr 21, 2023Updated 3 years ago
- ☆15Dec 10, 2019Updated 6 years ago