a labelled version of the ADFA-LD dataset for HIDS evaluation
☆50Aug 2, 2019Updated 6 years ago
Alternatives and similar repositories for a-labelled-version-of-the-ADFA-LD-dataset
Users that are interested in a-labelled-version-of-the-ADFA-LD-dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14May 16, 2021Updated 4 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆12Jul 12, 2018Updated 7 years ago
- ☆22Mar 2, 2024Updated 2 years ago
- Tests for verifying compliance of RMM implementations☆23Updated this week
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Anomaly Detector Tool for ROS☆13Aug 20, 2018Updated 7 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- Using DSPy and LLM's to translate Sanskrit verses☆18Jun 22, 2024Updated last year
- ☆12Sep 13, 2023Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- ☆10Dec 11, 2021Updated 4 years ago
- IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection☆28Jan 17, 2024Updated 2 years ago
- Logistic regression, text emotion classifier web application (with Streamlit), from data preprocession to model productionizing and deplo…☆15Oct 7, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Classes and methods for Geometric Deep Learning to support Substack, LinkedIn newsletters and tutorials☆26Apr 23, 2026Updated last week
- An agent for CUDA compute-communication kernel co-design☆35Mar 24, 2026Updated last month
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆92Dec 8, 2022Updated 3 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆33May 23, 2024Updated last year
- ☆19Apr 21, 2025Updated last year
- GKE cluster using Litmus Chaos Engine to validate Zebrium's unsupervised Machine Learning incident detection platform☆18Jun 2, 2023Updated 2 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆90Jan 24, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- RC5 encryption algorithm☆17May 12, 2019Updated 6 years ago
- ☆14Mar 10, 2025Updated last year
- ☆19Oct 24, 2024Updated last year
- sAoccec something about ossec☆17Apr 27, 2013Updated 13 years ago
- Official Go implementation of the Ethereum protocol☆19Jul 24, 2018Updated 7 years ago
- Description: source code of the OPTEE_OS for NVIDIA Jetson Linux☆12Jan 12, 2023Updated 3 years ago
- 同济大学硕博士论文LaTeX模板☆16Jul 1, 2024Updated last year
- ☆12Apr 17, 2017Updated 9 years ago
- Utilize the capability of GPT-4o Vision on the UHHGPT web portal☆12Aug 26, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Nov 11, 2025Updated 5 months ago
- Source Code for Graph Anomaly Detection with Unsupervised GNNs (ICDM2022)☆12Oct 18, 2022Updated 3 years ago
- the good ol days when you used to post basic ML shit and your repo gets starred enough times to doubt your career choices☆17Dec 17, 2019Updated 6 years ago
- ☆12Sep 11, 2020Updated 5 years ago
- A HTTP framework for storage and memory constraint environments (microcontrollers)☆31Jul 26, 2014Updated 11 years ago
- Trusted execution experiments with Intel SGX☆11Jun 17, 2020Updated 5 years ago
- ☆13Apr 8, 2021Updated 5 years ago