sspku-2021 / PBCNNLinks
☆17Updated 4 years ago
Alternatives and similar repositories for PBCNN
Users that are interested in PBCNN are comparing it to the libraries listed below
Sorting:
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- An Intrusion Detection System based on Deep Belief Networks☆84Updated 2 years ago
- ☆20Updated 6 months ago
- ☆11Updated 3 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆15Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- ☆44Updated 3 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- ☆13Updated last year
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- IDS abnormal traffic detection tensorflow☆41Updated 6 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆35Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆113Updated 2 years ago
- ☆9Updated 2 years ago
- ☆15Updated 3 years ago
- Network Traffic Classification with Graph Neural Networks☆10Updated last year
- 论文Encrypted Traffic Classification with One-dimensional Convolution Neural Networks的torch实现☆37Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- ☆10Updated last year
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆20Updated 7 months ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- ☆25Updated last year
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Updated 5 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆46Updated 10 months ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 11 months ago