A PyTorch implementation of of Anomal-E.
☆43Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for Anomal-E
Users that are interested in Anomal-E are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Aug 7, 2023Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆107Jun 30, 2022Updated 3 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆78Oct 11, 2021Updated 4 years ago
- NEGSC☆47May 30, 2024Updated last year
- ☆55Nov 11, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18Feb 22, 2022Updated 4 years ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆24Aug 28, 2025Updated 7 months ago
- ☆20Mar 25, 2024Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆123Oct 25, 2022Updated 3 years ago
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆22Jun 19, 2025Updated 9 months ago
- ☆23Oct 22, 2024Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Jan 4, 2024Updated 2 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Code for ICML 2023 paper "Quantifying the Knowledge in GNNs for Reliable Distillation into MLPs"☆22Sep 24, 2025Updated 6 months ago
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆37Dec 6, 2024Updated last year
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated 3 months ago
- ☆22Sep 8, 2025Updated 7 months ago
- Basic Blockchain-Based Federated Learning Intrusion Detection System☆12Nov 2, 2022Updated 3 years ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆18Oct 14, 2020Updated 5 years ago
- ☆103Nov 25, 2023Updated 2 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- Scripts for downloading, preprocessing, and numpy-ifying popular machine learning datasets☆11Jan 2, 2025Updated last year
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆200Apr 21, 2023Updated 2 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- ☆21Oct 13, 2023Updated 2 years ago