Journal Article: IEEE Access
☆18Oct 23, 2023Updated 2 years ago
Alternatives and similar repositories for A-Novel-Two-Stage-Deep-Learning-Model-for-Network-Intrusion-Detection
Users that are interested in A-Novel-Two-Stage-Deep-Learning-Model-for-Network-Intrusion-Detection are comparing it to the libraries listed below
Sorting:
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated last year
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- This repository introduces the NICT Darknet Dataset 2022 https://csdataset.nict.go.jp/darknet-2022/☆11Sep 29, 2023Updated 2 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆198Apr 21, 2023Updated 2 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- 基于Python,以CA认证为基础,通过SSL握手协议交换密钥,实现AES加密通信的聊天室☆10Aug 22, 2024Updated last year
- 双向身份认证系统☆10Nov 25, 2021Updated 4 years ago
- Optimize with SigOpt with this standalone SigOpt client driver.☆12Updated this week
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- ☆11Mar 13, 2025Updated 11 months ago
- ☆11Feb 14, 2023Updated 3 years ago
- Multi-scale Signed Recurrence Plot Based Time Series Classification Using Inception Architectural Networks☆10Jul 11, 2023Updated 2 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- ☆10Jul 29, 2021Updated 4 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆13Aug 28, 2024Updated last year
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- Web application for MEC011 API testing.☆12Jul 24, 2020Updated 5 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- 王道课后习题代码☆10Nov 11, 2022Updated 3 years ago
- Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the…☆54Jun 3, 2022Updated 3 years ago
- This project implements the Adaptive Kernel Kalman Filter (AKKF) for tracking a single target in non-linear, non-Gaussian environments us…☆15Nov 6, 2024Updated last year
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Driving range prediction by looking at energy consumption rate of Electronic Vehicles using ML regression techniques.☆14Sep 19, 2021Updated 4 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- ☆17Aug 1, 2025Updated 7 months ago
- MAMMAL - Magnetic Anomaly Map Matching Airborne and Land: A Python package for simulating and processing aeromagnetic anomaly survey data…☆17May 24, 2024Updated last year
- Web application that aggregates CNN's Fear and Greed Index and delivers it in a RESTful API☆15Jan 2, 2018Updated 8 years ago
- Pytorch Implementation of Deep Kalman Filter☆12Sep 30, 2025Updated 5 months ago
- CUAHN-VIO: Content-and-Uncertainty-Aware Homography Network for Visual-Inertial Odometry☆19Mar 11, 2025Updated 11 months ago
- The implementation of Meta-Pec☆12Sep 13, 2023Updated 2 years ago
- ☆10Apr 5, 2015Updated 10 years ago
- 擷取台股每日券商交易狀況, 並計算排名 (Python)☆13Jul 1, 2014Updated 11 years ago
- Duo OIDC-based two-factor authentication for NodeJS web applications☆16Nov 17, 2025Updated 3 months ago
- Login feature data of more than 33M login attempts and 3M users (IP, UA, RTT)☆16Jun 29, 2022Updated 3 years ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago