☆19Mar 29, 2022Updated 4 years ago
Alternatives and similar repositories for NetworkTrafficGeneration
Users that are interested in NetworkTrafficGeneration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate network packets using generative modeling☆15May 17, 2023Updated 3 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- Leveraging Attention Mechanisms to improve the BERT fine-tuning model for encrypted traffic classification☆17Mar 29, 2026Updated last month
- (SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare☆97Oct 8, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆47Dec 9, 2018Updated 7 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆27Sep 21, 2024Updated last year
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- A multi-access (edge) fog computing mobile crowd-sensing simulator. Given a place as input, the current version creates a user movements …☆11Sep 18, 2025Updated 8 months ago
- Example for accessing SPARQL endpoints in Python with Pandas☆13Aug 23, 2022Updated 3 years ago
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 6 years ago
- Parse Suricata rules☆14Aug 1, 2023Updated 2 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆11May 28, 2022Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- ☆58Dec 8, 2022Updated 3 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- 在cifar10数据集下对resnet-18加入se-net的效果测试☆10May 9, 2019Updated 7 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- Implementation of: Hydra Attention: Efficient Attention with Many Heads (https://arxiv.org/abs/2209.07484)☆14Jan 8, 2023Updated 3 years ago
- SimpleNids is a simple network traffic detection system based on libnids. Can effectively detect network packets, including: IP packets, …☆12Nov 29, 2024Updated last year
- Team Jonas contribution to ERP Prediction Contest, February 15, 2019 - May 15, 2019☆16Oct 3, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- RDF data for Knowledge Graph Reasoning Challenge.☆21Feb 28, 2025Updated last year
- ☆19Feb 5, 2025Updated last year
- 使用NextJs SSG的静态博客,目前已加入搜索、评论功能。a static blog with next.js☆11Dec 12, 2025Updated 5 months ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- Free and open implementation of the IEC 60870-6 TASE.2 protocol☆20Apr 29, 2020Updated 6 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆19Mar 16, 2021Updated 5 years ago
- ☆17Mar 27, 2025Updated last year
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IoT device type identification using machine learning techniques.☆40Aug 18, 2018Updated 7 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Calculate flow statistics from a given network capture file.☆18Nov 22, 2015Updated 10 years ago
- A network topology with all the essential configuration for a multi-location based company.☆23Jul 17, 2018Updated 7 years ago
- Laplacian Change Point Detection for Dynamic Graphs (KDD 2020)☆28Jul 13, 2023Updated 2 years ago
- 用来存放学习、测试、开发、写技术文章等过程中需要的各种例子和 demo☆20Feb 9, 2023Updated 3 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago