thanujann / CSMA-CD-Protocol-SimulatorLinks
Simulates a persistent and non-persistent Carrier Sense Multiple Access/Collision Detect (CSMA/CD) protocol in computer networking, written in Python.
☆15Updated 6 years ago
Alternatives and similar repositories for CSMA-CD-Protocol-Simulator
Users that are interested in CSMA-CD-Protocol-Simulator are comparing it to the libraries listed below
Sorting:
- Bluetooth Indoor Positioning with DNNs☆13Updated 3 years ago
- ☆33Updated 5 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated 2 years ago
- RSSI-based OFDM signal classification using a machine learning algorithm.☆12Updated 7 years ago
- A Benchmark Tool for Natural Language-based Network Management☆29Updated last year
- Community detection is an important research area in social networks analysis where we are concerned with discovering the structure of th…☆26Updated 5 years ago
- A 3D visualization of the Internet topology Zoo with Google Earth☆56Updated last year
- knowledgedefinednetworking / Unveiling-the-potential-of-GNN-for-network-modeling-and-optimization-in-SDN☆56Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Updated 2 years ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆127Updated 2 years ago
- P4DDLe: Introducing Packet-Level Analysis in Programmable Data Planes to Advance Network Intrusion Detection☆20Updated last year
- Multi-scale Anomaly Detection on Attributed Networks☆14Updated 4 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Updated 2 years ago
- A Multi_Scale LSTM Model.☆18Updated 8 years ago
- ☆18Updated 2 years ago
- This repository contains datasets for network modeling simulated with OMNet++☆104Updated 3 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Updated 2 years ago
- ☆18Updated 5 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆196Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- This program allow you to extract some features from pcap files.☆40Updated 2 years ago
- Algorithms of rule extraction from neural networks☆35Updated 2 years ago
- Community evolution on Stack Overflow☆10Updated 7 years ago
- Algorithm to Calculate trust among the nodes of the network and derivation of various properties of trust.☆12Updated 4 years ago
- ☆34Updated 5 years ago
- ☆18Updated 5 years ago
- AIMS South Africa Short Course on Optimization☆18Updated last year
- Implementation of RouteNet, an effective way for Network Modeling and Optimization in SDN☆18Updated last year
- Papers on trustworthy anomaly detection☆29Updated last year
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆11Updated last year