Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
☆18May 10, 2023Updated 2 years ago
Alternatives and similar repositories for Deep-Learning-Evaluation-of-IDS-Datasets
Users that are interested in Deep-Learning-Evaluation-of-IDS-Datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆48Sep 24, 2022Updated 3 years ago
- ☆10Apr 30, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Apr 11, 2017Updated 9 years ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 8 months ago
- An attempt to predict stock market volatility, return and trading volume of tech stocks using Semantic Vectors and Google Trends, which r…☆13May 17, 2017Updated 8 years ago
- Python-based JA3 Generation Server☆13Mar 29, 2020Updated 6 years ago
- 运行图显示程序☆13Oct 12, 2021Updated 4 years ago
- NEGSC☆47May 30, 2024Updated last year
- This project showcases a big data processing pipeline for cryptocurrency data using Hadoop, Spark Streaming, Kafka, MongoDB, and a React …☆13May 10, 2023Updated 2 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- By using python 3.6 and google recognizer and ffmpeg it will convert video file like mp4 to audio file like mp3 and also convert 3gp file…☆13Jan 30, 2019Updated 7 years ago
- 图卷积网络模型代码 | Graph Convolutional Network Code | Pytorch☆18Jun 19, 2024Updated last year
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Train schedule diagrams of Japanese railways☆13Mar 17, 2025Updated last year
- Simple task offloading client to offload HTTP requests to edge servers☆10Dec 8, 2022Updated 3 years ago
- Blockchain reputation-based trust management system☆17Jul 14, 2019Updated 6 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆15Dec 7, 2023Updated 2 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- IoT intrusion Detection Model based on neural network and random forests☆49Oct 16, 2018Updated 7 years ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- IoV Reputation Mechanism simulation using SUMO, OMNETPP and VEINS.☆17Aug 8, 2020Updated 5 years ago
- Trust management model in IoT☆16Oct 11, 2021Updated 4 years ago
- Myntra 'HackerRamp: WeForShe' hackathon's pre-finale submission 'V-Shop' is a communicative web application which will facilitate the use…☆13Jan 17, 2022Updated 4 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- My introduction project to the Ethereum Blockchain, Solidity, and Smart Contracts.☆17Sep 12, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- ☆18Dec 31, 2023Updated 2 years ago
- Simulating communication in a VANET (Vehicular Ad-Hoc Networks), and implementing access control, using concepts from blockchains, mainta…☆16Apr 29, 2022Updated 3 years ago
- LenslessFace : An End-to-End Optimized Lensless System for Privacy-Preserving Face Verification☆22Jul 21, 2024Updated last year
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆18Mar 12, 2025Updated last year
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago