yue123161 / Paper_TNSMLinks
Code for paper: Contrastive Learning Enhanced Intrusion Detection
☆18Updated 2 years ago
Alternatives and similar repositories for Paper_TNSM
Users that are interested in Paper_TNSM are comparing it to the libraries listed below
Sorting:
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆14Updated 3 years ago
- ☆11Updated 3 years ago
- ☆15Updated last year
- ☆20Updated 9 months ago
- Network Traffic Classification with Graph Neural Networks☆11Updated 2 years ago
- ☆47Updated 3 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆89Updated 3 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆19Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Updated 2 years ago
- ☆10Updated 2 years ago
- ☆20Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆37Updated 2 years ago
- ☆28Updated 2 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆59Updated 2 years ago
- ☆11Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆50Updated last year
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- ☆92Updated last year
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆18Updated 2 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆16Updated 3 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 5 years ago
- ☆21Updated 5 years ago
- ☆11Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆23Updated last year
- NEGSC☆42Updated last year
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆117Updated 3 years ago