vinayakumarr / KalasalingamLinks
IEEE "Invited Talk on Deep Learning" 03/02/2018
☆15Updated 5 years ago
Alternatives and similar repositories for Kalasalingam
Users that are interested in Kalasalingam are comparing it to the libraries listed below
Sorting:
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Updated 8 years ago
- Reinforcement Learning for Anomaly Detection☆45Updated 7 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆30Updated 10 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Updated 7 years ago
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆51Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Updated 6 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆170Updated 2 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆161Updated 2 weeks ago
- Face Recognition with Transfer Learning☆14Updated 7 years ago
- NSL-KDD Dataset☆194Updated 10 years ago
- Machine Learning Based - Intrusion Detection System☆32Updated 3 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆268Updated 5 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆288Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆213Updated last year
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆73Updated 4 years ago
- Conditional Deep Convolutional GAN☆42Updated 6 years ago
- Deep Convolutional Bidirectional LSTM for Complex Activity Recognition with Missing Data. Human Activity Recognition Challenge. Springer …☆23Updated 4 years ago
- Cybersecurity Data Mining Competition 2017☆10Updated 6 years ago
- A conversational agent or a chatbot is piece of software which can communicate with human users with the help of natural language process…☆16Updated 7 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆38Updated 8 years ago
- Autoencoder model for rare event classification☆105Updated 6 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆51Updated 11 months ago
- an AI messenger bot made with Flask!☆10Updated 8 years ago
- IoT intrusion Detection Model based on neural network and random forests☆48Updated 7 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆92Updated 6 years ago
- implement IDS using deep learning☆12Updated 6 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆36Updated 7 years ago
- CSE-CIC-IDS-2018 analyze with Random Forest☆32Updated 4 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Updated 9 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 7 years ago