a labelled version of the ADFA-LD dataset for HIDS evaluation
☆50Aug 2, 2019Updated 6 years ago
Alternatives and similar repositories for a-labelled-version-of-the-ADFA-LD-dataset
Users that are interested in a-labelled-version-of-the-ADFA-LD-dataset are comparing it to the libraries listed below
Sorting:
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14May 16, 2021Updated 4 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- ☆11May 3, 2022Updated 3 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- Java安全相关,目前主要是CC链研究☆10Sep 1, 2022Updated 3 years ago
- Using DSPy and LLM's to translate Sanskrit verses☆18Jun 22, 2024Updated last year
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- ☆10Dec 11, 2021Updated 4 years ago
- dataSet for kubAnomaly model☆19Mar 24, 2023Updated 2 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆29Apr 15, 2023Updated 2 years ago
- An agent for CUDA compute-communication kernel co-design☆32Mar 11, 2026Updated last week
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- FMCW 雷达AWR1642 采集数据的手势识别☆11Nov 7, 2023Updated 2 years ago
- Java安全研究与安全开发面试题库,同是也是常见知识点的梳理和总结,包含问题和详细的答案,计划定期更新☆16Apr 30, 2022Updated 3 years ago
- ☆39Mar 12, 2019Updated 7 years ago
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆92Dec 8, 2022Updated 3 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- Source code of DisenHAN: Disentangled Heterogeneous Graph Attention Network for Recommendation, CIKM 2020☆14Mar 18, 2023Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆19Feb 2, 2023Updated 3 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆51Mar 12, 2026Updated last week
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆32May 23, 2024Updated last year
- ☆21Sep 21, 2020Updated 5 years ago
- GKE cluster using Litmus Chaos Engine to validate Zebrium's unsupervised Machine Learning incident detection platform☆18Jun 2, 2023Updated 2 years ago
- CS315 : Database Management Systems (DBMS) Project☆12Oct 30, 2022Updated 3 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- Artifacts for ATC '22 paper "Faster Software Packet Processing on FPGA NICs with eBPF Program Warping"☆17May 20, 2022Updated 3 years ago
- ☆27Aug 6, 2023Updated 2 years ago
- ☆11Sep 23, 2016Updated 9 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- Official Go implementation of the Ethereum protocol☆19Jul 24, 2018Updated 7 years ago
- sAoccec something about ossec☆17Apr 27, 2013Updated 12 years ago
- OpenAI library for Crystal, providing an interface to interact with various OpenAI services.☆12Jan 17, 2024Updated 2 years ago
- Research compiler based on algorithmic skeletons☆23Oct 18, 2014Updated 11 years ago
- 同济大学硕博士论文LaTeX模板☆15Jul 1, 2024Updated last year
- ☆12Apr 17, 2017Updated 8 years ago