waimorris / E-GraphSAGELinks
A PyTorch implementation of of E-GraphSAGE.
☆93Updated 3 years ago
Alternatives and similar repositories for E-GraphSAGE
Users that are interested in E-GraphSAGE are comparing it to the libraries listed below
Sorting:
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆73Updated 4 years ago
- ☆52Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- ☆21Updated 2 years ago
- NEGSC☆42Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆16Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆47Updated 2 years ago
- ☆28Updated 2 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆38Updated last year
- Network System Intrusion Detection using Graph Neural Networks☆19Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆58Updated last year
- ☆24Updated 3 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Updated 6 months ago
- ☆11Updated last year
- ☆91Updated last year
- ☆13Updated 4 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆105Updated 10 months ago
- ☆10Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- ☆15Updated 2 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Updated last year
- Anomaly Detection using PCA and BiGAN☆14Updated 5 years ago
- ☆19Updated last year
- ☆21Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆121Updated last year
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆17Updated 2 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆85Updated last year