a labelled version of the ADFA-LD dataset for HIDS evaluation
☆50Aug 2, 2019Updated 6 years ago
Alternatives and similar repositories for a-labelled-version-of-the-ADFA-LD-dataset
Users that are interested in a-labelled-version-of-the-ADFA-LD-dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆54May 15, 2025Updated 10 months ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14May 16, 2021Updated 4 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- ☆21Mar 2, 2024Updated 2 years ago
- ☆22Dec 12, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- Java安全相关,目 前主要是CC链研究☆10Sep 1, 2022Updated 3 years ago
- It is a Full-Stack GUI Application using Java Swing API☆13Sep 19, 2024Updated last year
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- ☆12Sep 13, 2023Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- ☆10Dec 11, 2021Updated 4 years ago
- DEPRECATED, please use upstream at @sjtug☆13Dec 26, 2017Updated 8 years ago
- "Help us understand how geography affects virality."☆10May 27, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆30Apr 15, 2023Updated 2 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆92Dec 8, 2022Updated 3 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- The objective of this project is to maintain a record of all the cyber-crime complaints reported by the victims and provide a platform fo…☆13Dec 4, 2019Updated 6 years ago
- Synthesized speech recognition☆38Jun 9, 2025Updated 10 months ago
- Source code of DisenHAN: Disentangled Heterogeneous Graph Attention Network for Recommendation, CIKM 2020☆14Mar 18, 2023Updated 3 years ago
- Codes for Stackelberg GAN☆15Apr 23, 2019Updated 6 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆52Mar 12, 2026Updated 3 weeks ago
- A Secure Version of DATAVIEW using SGX techniques.☆10Jul 6, 2021Updated 4 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆32May 23, 2024Updated last year
- The stastics information of top conference realted to information area including AI, ML, CV, etc☆26Jan 31, 2020Updated 6 years ago
- A PyTorch implementation of of Anomal-E.☆43Dec 16, 2022Updated 3 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- 极简版上海交大课程作业LaTex模板(支持多作者)。A XeLaTeX template of TERM PAPER or PROJECT for Shanghai Jiao Tong University (SJTU) students.☆21Dec 30, 2019Updated 6 years ago
- RC5 encryption algorithm☆17May 12, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Mar 10, 2025Updated last year
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- ☆20Oct 24, 2024Updated last year
- ☆28Aug 6, 2023Updated 2 years ago
- TCP, ICMP check for China Vpn . 用于部署在国内节点,监测国外节点是否tcp阻断,或者被屏蔽ip☆19Aug 30, 2018Updated 7 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 4 months ago
- Official Go implementation of the Ethereum protocol☆19Jul 24, 2018Updated 7 years ago