Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
☆28Jun 25, 2019Updated 6 years ago
Alternatives and similar repositories for Intrusion_Detection
Users that are interested in Intrusion_Detection are comparing it to the libraries listed below
Sorting:
- Sorting files in a directory according to their extensions☆18Dec 25, 2017Updated 8 years ago
- Performing IoT with arduino without WiFi Module☆12Dec 17, 2017Updated 8 years ago
- A simple albeit functional Social Networking application using PHP, MySQL and CSS☆12Aug 23, 2011Updated 14 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Android touch and sensors controlled mouse cursor(Accelerometer and light intensity)☆74Apr 2, 2023Updated 2 years ago
- Javascript sample apps using the Meetup API☆13Oct 1, 2010Updated 15 years ago
- Controlling mouse cursor from eye.☆45Oct 9, 2022Updated 3 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- A simple php search engine☆15Jul 30, 2013Updated 12 years ago
- The simplest example on how to POST data from Ionic to PHP server☆19Jun 21, 2017Updated 8 years ago
- Automate replies to all birthday wishes on facebook.☆23Sep 25, 2020Updated 5 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- Using FaceRecognition to solve track indiviuals in CCTV footage.☆25Apr 5, 2018Updated 7 years ago
- Aadhaar API for .NET is a client library that provides an easy way to interact with the UIDAI Aadhaar services.☆32Nov 27, 2017Updated 8 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Bot for JCT ESP CompSci Discord Server☆11Updated this week
- Computer Science Homework☆12Mar 2, 2022Updated 4 years ago
- A static tool to analyze the history of your git repository☆11Nov 9, 2023Updated 2 years ago
- An iOS app that provides real-time emergency alerts for Israeli citizens.☆14Dec 19, 2025Updated 2 months ago
- Python Scripts to scrap data from websites☆12May 22, 2023Updated 2 years ago
- ☆22May 15, 2025Updated 9 months ago
- Face recognition with low light with Pi zeroW☆10Feb 7, 2021Updated 5 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- Need to convert all your dev-speak into plain English? This might help.☆11Sep 6, 2021Updated 4 years ago
- My solutions to HackerRank problems☆11Sep 6, 2016Updated 9 years ago
- Resources to Learn WebVR 😎☆12Jun 21, 2019Updated 6 years ago
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- JavaScript library for creating particles animation.☆10Mar 23, 2016Updated 9 years ago
- ☆12May 14, 2020Updated 5 years ago
- ☆11Mar 13, 2019Updated 6 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- Using OCR and pytesseract to extract links from images in Python☆15Dec 23, 2018Updated 7 years ago
- Retrofit Tutorials for Android☆11May 1, 2017Updated 8 years ago
- ☆11Apr 2, 2021Updated 4 years ago
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- AWS Certified Solutions Architect Professional 2020 - SAP-C01☆10Dec 1, 2019Updated 6 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- RSA Encryption and Decryption project☆10Apr 23, 2018Updated 7 years ago