☆27Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for HorusEye
Users that are interested in HorusEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆42Jun 19, 2023Updated 2 years ago
- An Efficient Design of Intelligent Network Data Plane☆60Mar 16, 2023Updated 3 years ago
- ☆14Feb 14, 2024Updated 2 years ago
- Artifacts accompanying the NSDI '24 paper: Leo: Online ML-based Traffic Classification at Multi-Terabit Line Rate.☆22Mar 8, 2024Updated 2 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Planter is a modular framework for realising in one-click in-network machine learning algorithms.☆26Jun 13, 2024Updated last year
- In-network detection of network attacks using Random Forests and P4☆28Dec 22, 2023Updated 2 years ago
- Aggregate-Based Congestion Control for Pulse-Wave DDoS Defense☆55Jul 28, 2022Updated 3 years ago
- Flowrest: in-switch flow-level classification with random forests☆35Feb 2, 2026Updated last month
- ☆11Oct 25, 2023Updated 2 years ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆18Apr 25, 2025Updated 11 months ago
- Do Switches Dream of Machine Learning?, HotNets 2019☆70Nov 14, 2019Updated 6 years ago
- ☆37Jan 14, 2025Updated last year
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆139Oct 30, 2023Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 11 months ago
- In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches☆16Jan 27, 2024Updated 2 years ago
- High-Fidelity Synthetic Network Traffic Generation☆78Sep 20, 2025Updated 6 months ago
- This project aims to analyze and classify a real network traffic dataset to detect malicious/benign traffic records. It compares and tune…☆25May 1, 2024Updated last year
- "Offloading Real-time DDoS Attack Detection to Programmable Data Planes" P4 description☆39Dec 25, 2020Updated 5 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- 一个微型的基于 Python 的 HMM (隐马尔可夫模型) 包 | A micro python package for HMM (Hidden Markov Model)☆15Jan 15, 2020Updated 6 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- pcap数据包文件可视化分析工具,可以获取明文数据包中的敏感信息☆28Apr 20, 2017Updated 8 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- Browser-based packet viewer powered by Wireshark☆20Jul 28, 2025Updated 7 months ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- os lectures 2022 spring☆10Aug 25, 2025Updated 7 months ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- "Requet: Real-Time QoE Detection for Encrypted YouTube Traffic" reproduction☆10Jun 16, 2022Updated 3 years ago
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆25May 21, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 3 years ago
- A platform that provides users with easy access to AI services developed by Montimage and usage of explainable AI techniques (e.g., LIME,…☆10Feb 17, 2026Updated last month
- ESP8266 probe sniffer☆12Mar 18, 2017Updated 9 years ago
- Offloading Real-time DDoS Attack Mitigation to Programmable Data Planes☆28Apr 26, 2022Updated 3 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Jun 10, 2022Updated 3 years ago
- [CIKM 2025] Constraint Back-translation Improves Complex Instruction Following of Large Language Models☆17May 23, 2025Updated 10 months ago
- Simulator for pFabric's ideal algorithm.☆11Apr 14, 2016Updated 9 years ago