vanlalruata / DCNNBiLSTM-An-Efficient-Hybrid-Deep-Learning-Based-Intrusion-Detection-SystemView on GitHub
Journal Article: Telematics and Informatics Reports
☆12Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for DCNNBiLSTM-An-Efficient-Hybrid-Deep-Learning-Based-Intrusion-Detection-System
Users that are interested in DCNNBiLSTM-An-Efficient-Hybrid-Deep-Learning-Based-Intrusion-Detection-System are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆14Aug 28, 2024Updated last year
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 11 months ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Adaptive Federated Learning Approach to DDoS attack detection☆54Feb 2, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs☆21Nov 15, 2025Updated 4 months ago
- Journal Article: International Journal of Information Technology☆13Jun 27, 2023Updated 2 years ago
- Multi-scale Signed Recurrence Plot Based Time Series Classification Using Inception Architectural Networks☆10Jul 11, 2023Updated 2 years ago
- Computers & Security☆20Oct 31, 2025Updated 4 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection☆29Aug 26, 2024Updated last year
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆31Jun 29, 2023Updated 2 years ago
- 王道课后习题代码☆10Nov 11, 2022Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆12Apr 22, 2021Updated 4 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- ☆35Nov 21, 2022Updated 3 years ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆43Dec 19, 2025Updated 3 months ago
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- 社工库demo☆12May 24, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 6 years ago
- ☆14Feb 26, 2025Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- The source code of the paper "Compressed Federated Learning Based on Adaptive Local Differential Privacy".☆10Oct 23, 2023Updated 2 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- 泛微OA V8 SQL注入☆10Apr 11, 2021Updated 4 years ago
- 操作系统课程设计,使用c++基于Qt框架开发的任务管理器,ui仿照win10☆11Mar 23, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 5 months ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆27Sep 21, 2024Updated last year
- Basic Blockchain-Based Federated Learning Intrusion Detection System☆12Nov 2, 2022Updated 3 years ago