vanlalruata / DCNNBiLSTM-An-Efficient-Hybrid-Deep-Learning-Based-Intrusion-Detection-SystemView on GitHub
Journal Article: Telematics and Informatics Reports
☆12Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for DCNNBiLSTM-An-Efficient-Hybrid-Deep-Learning-Based-Intrusion-Detection-System
Users that are interested in DCNNBiLSTM-An-Efficient-Hybrid-Deep-Learning-Based-Intrusion-Detection-System are comparing it to the libraries listed below
Sorting:
- Journal Article: IEEE Access☆18Oct 23, 2023Updated 2 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆13Aug 28, 2024Updated last year
- NEGSC☆47May 30, 2024Updated last year
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- Adaptive Federated Learning Approach to DDoS attack detection☆54Feb 2, 2026Updated last month
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆31Jun 29, 2023Updated 2 years ago
- Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection☆29Aug 26, 2024Updated last year
- ☆35Nov 21, 2022Updated 3 years ago
- 基于fedavg联邦学习算法smote过采样对联邦信用卡欺诈交易检测任务进行了优化,其中fedavg算法通过创建Server与Clients对象来模拟真实场景下的服务器<-->节点的双向参数传递。☆10Mar 29, 2024Updated last year
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- ☆45Dec 25, 2025Updated 2 months ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆43Dec 19, 2025Updated 2 months ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 10 months ago
- ☆13Apr 27, 2018Updated 7 years ago
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 5 years ago
- A small CTFd plugin to send notifications about solves and admin announcements to Slack/Discord/Telegram☆13Oct 20, 2021Updated 4 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- 一个快速扫描dns域传输漏洞的脚本(ZTdns is a quick script to scan for DNS zone transfer vulnerabilities)☆14Apr 7, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- 从零开始的内网渗透学习记录☆12Mar 25, 2022Updated 3 years ago
- 泛微OA V8 SQL注入☆10Apr 11, 2021Updated 4 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- ☆17Mar 22, 2019Updated 6 years ago
- 这是一份包含所有目前官方已知漏洞的C语言漏洞集合 ,用于科研使用☆12Apr 9, 2023Updated 2 years ago
- Journal Article: International Journal of Information Technology☆13Jun 27, 2023Updated 2 years ago
- 一键给文件夹中所有的代码添加注释的应用☆14Dec 21, 2023Updated 2 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- Causing a DDOS attack and mitigating it using blockchain and smart contracts.☆13Apr 26, 2018Updated 7 years ago