vinayakumarr / Kalasalingam
IEEE "Invited Talk on Deep Learning" 03/02/2018
☆15Updated 4 years ago
Alternatives and similar repositories for Kalasalingam:
Users that are interested in Kalasalingam are comparing it to the libraries listed below
- Sentiment Analysis and Figurative Language in French Tweets☆10Updated 5 years ago
- Cybersecurity Data Mining Competition 2017☆10Updated 6 years ago
- SSH traffic analysis☆23Updated 5 years ago
- Domain Generation Algorithms (DGAs) using traitional machine learning and deep learning☆9Updated 6 years ago
- Cybersecurity Data Mining Competition 2016☆11Updated 6 years ago
- Android malware detection using static and dynamic analysis☆38Updated 5 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆266Updated last year
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆249Updated 4 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆698Updated 5 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆18Updated 3 years ago
- Network data classifier based on the recurrent neural network.☆22Updated 5 years ago
- Deep Reinforcement One-Shot Learning Framework for Artificially Intelligent Classification Systems☆36Updated 4 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆100Updated 7 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆30Updated 9 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆33Updated 6 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆15Updated 4 years ago
- ☆15Updated 8 years ago
- A conversational agent or a chatbot is piece of software which can communicate with human users with the help of natural language process…☆16Updated 6 years ago
- Implementation of the paper "Deep Android Malware Detection" as part of the course project for the course Information Assurance & Securit…☆9Updated 6 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆162Updated last year
- In five courses, you will learn the foundations of Deep Learning, understand how to build neural networks, and learn how to lead successf…☆19Updated 6 years ago
- Reinforcement Learning for Anomaly Detection☆42Updated 6 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Updated 3 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆135Updated 6 years ago
- This repository contains my notes for the research papers that I read for anyone to briefly glance over the details.☆13Updated 6 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆20Updated 4 years ago
- Deep Learning in Monitoring Surveillance Videos. Winner of Facebook Hacker Demo at "Hack The North 2017" hackathon at University of Wat…☆32Updated 7 years ago
- An approach to detect Malware Files using Deep Learning☆6Updated 5 years ago
- Learn to code deep learning algorithms☆12Updated 6 years ago